A Secure DevOps Journey

30
November 15, 2016 A Secure DevOps Journey Peter Chestna, Director of Developer Engagement, Veracode

Transcript of A Secure DevOps Journey

Page 1: A Secure DevOps Journey

November 15, 2016

A Secure DevOps JourneyPeter Chestna, Director of Developer Engagement, Veracode

Page 2: A Secure DevOps Journey

November 15, 2016

Page 3: A Secure DevOps Journey

• Development methodologies used at Veracode – Waterfall, Agile, DevOps– People

– Process

– Technology

– Security

• Veracode’s journey– What did we change

– What were the results

Goals

Page 4: A Secure DevOps Journey

• 2006 – Veracode founded/Waterfall

• 2012 – Agile

• 2013 – Purina

• 2014 – Microservices

• 2015 - DevOps

Veracode Timeline

Page 5: A Secure DevOps Journey

Felt like…

Transformation – People/Org/Culture

Management• Leading change• Organizational

• Breaking the silos• New specialties

• New skills – care & feeding• New expectations

Individual• Uncertainty/fear/anger• Organizational

• New manager• New team/peers

• New skills – X-functional• New expectations

Page 6: A Secure DevOps Journey

Looked like…

Transformation - Process

Most of the change occurred in Agile• Waterfall -> Agile was revolutionary• Agile -> DevOps was evolutionary• Like the Monty Python theory of

dinosaurs

Page 7: A Secure DevOps Journey

Waterfall

Transformation - Technology

AgileDevOps

Not as big of a difference between stagesJust more and more automation

Page 8: A Secure DevOps Journey

There was Waterfall

In the beginning…

Page 9: A Secure DevOps Journey

Waterfall - Process

Finding anything late creates a cycle of waste

Page 10: A Secure DevOps Journey

O

p

e

r

a

t

i

o

n

s

S

e

c

u

r

i

t

y

Q

u

a

l

i

t

y

D

e

v

e

l

o

p

m

e

n

t

A

r

c

h

i

t

e

c

t

u

r

e

R

e

q

u

i

r

e

m

e

n

t

s

Waterfall - People

Page 11: A Secure DevOps Journey

• Gantt charts• Text documents

• Requirements• Architecture• Designs• Test plans

• Manual tests• Manual deploy

• Shell scripts• SQL cripts

Waterfall - Technology

Old School

Page 12: A Secure DevOps Journey

Waterfall - Security

Occurred during testing cycle

Back end of process

Mostly manualUnpredictable amount of work

Page 13: A Secure DevOps Journey

Coming of Age: Agile

Page 14: A Secure DevOps Journey

Agile - Process

Copyright 2005, Mountain Goat Software

Page 15: A Secure DevOps Journey

Agile - People

Dev/Q

A

IT

D

ept

OP

S

Org

Se

curity

Page 16: A Secure DevOps Journey

Agile – Technology Initially

Page 17: A Secure DevOps Journey

Agile – Security – Early Days

3

Build

4

Static

Analysis

HardeningSprint

5

Security

Results

SecurityResults

2

Check in

1

Develop

AgileBacklog

Page 18: A Secure DevOps Journey

1

Develop

6

Static

Analysis

7

Synchronize

4

Check in

Static

Analysis

3

Build

& Test

2

AgileBacklog

Agile – Security – Automated and Integrated

5

Build

Nightly

Page 19: A Secure DevOps Journey

Agile – Security is not limited to automation of static analysis!

Security Champions

Security Grooming

(Requirements Review)

Security as part of the Definition

of Done

Threat ModelingSecure Code

ReviewPen Testing

Pre-Productions Dynamic Analysis

Page 20: A Secure DevOps Journey

Agile - Culture clash between Dev, OPS and Security

Page 21: A Secure DevOps Journey

We Have Arrived: DevOps

Page 22: A Secure DevOps Journey

DevOps - Process

Page 23: A Secure DevOps Journey

DevOps - People

Break the Silos

ReorganizeChange

the Culture

Page 24: A Secure DevOps Journey

DevOps - Technology

Automate!

Automate!

Automate!

Feature switching

for controlled

rollout

Rolling upgrades

Zero downtime

Make incremental

changes

Page 25: A Secure DevOps Journey

DevOps - Security

Page 26: A Secure DevOps Journey

1

Develop

4

Check in

Static

Analysis

3

Build

& Test

2

Backlog

DevOps – Security – Integrated into CD Pipeline

Pass?

7

SynchronizeNo Yes

7

Deploy to

Stage

6

Static

Analysis

6

Unit

Tests

8

Dynamic

Analysis

8

Regression

Testing

Pass?

Yes

Prod

Per Check-in

5

Build

CDPipeline

Page 27: A Secure DevOps Journey

Training

(eLearning, instructor led, metadata driven)

Static Application Security Testing + 3rd Party Risk Analysis

Remediation and Mitigation Guidance

Secure Code ReviewsManual Penetration Testing

Red Team Activities

Runtime Application

Self Protection

Dynamic Application Security Testing

Plan Code Build Test Stage Deploy Monitor

Threat Modeling

Security Grooming

Secure Design

DevOps – Pervasive Security

Page 28: A Secure DevOps Journey

This Is Our Journey

• Revolution at the micro level

• Evolution at the macro levelInnovation

• Always constructively dissatisfied

• Hypothesize, prototype, measure

• Sharpen the saw

Continuous Improvement

Page 29: A Secure DevOps Journey

November 15, 2016

Page 30: A Secure DevOps Journey

Thank You

w w w . v e r a c o d e . c o m

@PeteChestna