SlideShare a Scribd company logo
1 of 38
Download to read offline
!"#$%#&'()*+",#-.(/&-0(1*234)(
5#4*$#&*
67&%7&7(6*,87(9*:'7$
WHO AM I
● 9*+",#-.(;%20+7-*(< 9&.=
● OWASP Global Board of Directors – Vice - Chair
● Member of Review Board at BH Asia, Grace Hopper, BSides >0&?*,*&+*),
Global AppSec, etc.
● /&20$2*%(#&(Diversity Initiatives:
○ InfosecGirls
○ WoSec (Wo8*&(/&(9*+",#-.@
Dev
Security
Ops
Blame Game
Slide Credit: Pete Cheslock
Slide Credit: DevSecCon
DevSecOps
DevOps Visibility
7
● Confidence ● Compliance
● Observability Traceability
DevSecOps — Profits
7
DevSecOps — Integrating Security into DevOps
DevSecOps — Integrating Security into DevOps
User Stories
DevSecOps — Integrating Security into DevOps
User Stories Secure Coding
DevSecOps — Integrating Security into DevOps
User Stories Secure Coding Linting, Scanning
DevSecOps — Integrating Security into DevOps
User Stories Secure Coding Linting, Scanning QA
DevSecOps — Integrating Security into DevOps
User Stories Secure Coding Linting, Scanning QA Mutating
“Shift Left” is not enough
Empowering developers to build applications securely
within the entire development process
of respondents believe developers
should actually own security, but they
aren't well-equipped to do so.
of respondents feel that security is
a major constraint on the ability to
deliver software quickly.
81%
33%
Empower
developers
Enable
security team
!"#$%&'()"#*+#&,-"%./-.*++&/,
;++*4-7&+*(
-*)-)
A&#-(-*)-)
/&-*',7-#0&(
-*)-)
9-7-#+(
7&7$.)#)
01*"&2%/.#(,'*"/3"3(+#"3**45('6
;++*4-7&+*(
-*)-)
A&#-(-*)-)
/&-*',7-#0&(
-*)-)
9-7-#+(
7&7$.)#)
B7)- C#%%$#&' 9$0D 9$0D*,
7897:
;&#"
.*%/+&#/.$
E,7%#-#0&7$F5779
9*,2*,$*))
<./4='#&/,
:*>?*'@%+A"8,#*-.(#*4"#1./=-1/=#":*>@%+
1*4*&%*&+.(9*+",#-.G(>0&-7#&*,()*+",#-.G(H#+*&)*(2#0$7-#0&)
I*'#)-,.
%*4$0.
?*'=.&#$";(#*
7/4*
0*+#"B"C&D 0*+#E"C&DE"
F/,&#/.
J"#$%
K"J*,&*-*)
F/,&#/."B"2/.*GGG
0*+#E"C&DE"
F/,&#/.
)"J8#-
/&-*',7-*%(E:,0"':0"-(1*29*+34)
69(>0%* /&-*$$#L ;M",*(
I*40)
N#-O"J
!#-J"+=*- N#-H7J
>0&+0",)* L*&=#&)
;M",*(
5#4*$#&*) E*78>#-.
>$0"%(
B0"&%,.
5#20-7$
O*,0=" ;,-#?7+-0,.
8#+,0(?0+")
7/4&,- ?/=.'*"7/,#./) 7897:
7/,#(&,*.+"B"
?*.>*.)*++
9&.=(>H/
9&.=(>H/
<((?
K"J*,&*-*) 9&.=(;5/
H*%/.#&,-"B"
I/#&3&'(#&/,+
P+$#4)*
10+=*,(
O"J
10+=*,(
Q(0-:*,)
;R9(
H78J%7
/!C(
>$0"%
H*-&+#.&*+
9$7+=
L/I;
;M",*(
B"&+-#0&)
!#-!"+=*-(
5#4*$#&*)
;M",*(
>0&-7#&*,(
I*'#)-,.
N00'$*(
>0&-7#&*,(
I*'#)-,.
P$7)-#+(
>0&-7#&*,(
I*'#)-,.
?/3#J(.*"?=%%)$"71(&,A"";(S*D(I#)=(
5,0?#$*
7/4*
@%*,"?/=.'*"7/4*
7/,#(&,*.+
8,3.(+#.='#=.*"
(+"7/4*
● TU<VUW 0?(+0%*J7)*(#)(34*&(90",+*
● TUW(0?(2"$&*,7J#$#-#*)(?0"&%(#&(#&%#,*+-(%*4*&%*&+#*)
● XUU)(0?(H#&"Y(47+=7'*)(#&:*,#-*%(?,08(4"J$#+()0",+*)
● !"#$-G(%*4$0.*%(Q()+7$*%(#&()*+0&%)
● ZX(+$0"%(2"$&*,7J#$#-.(#)(8#)+0&?#'",7-#0& [S9;
● S*-D0,=(7++*))G()-0,7'*G()*,2*,) < %*4$0.*%(
7)(?7)-(7)(+0%*
● XU<]UW(0?(+0%*(#)(+")-08(< -:*(*$*8*&-)(-:7-(87=*(.0",(
744("&#^"*G(J"-(&0(0&*(#)(+08#&'(-0(:*$4(.0"
● 90?-D7,*(%*4$0.*%(%7#$.(< J"-(-.4#+7$()+7&)(-7=*("4(-0(
:0",)_(-:*(`D7-*,?7$$`(744,07+:(%0*)&`-()+7$*(7&.80,*a(
K*++/,+")*(.,*4"3./2"!%('1*"?#.=#+A"
(">=),*.(5&)&#$"#1(#")*(4"#/"(".*()L)&3*"1('6
!%('1*"?#.=#+"M7NOLPQRSLTUVWX"(##('6+"#&2*)&,*A"YRTQF"<*/%)*"1(4"1&-1)$"%*.+/,()"4(#("*D%/+*4
Apache is
notified of the
Struts vuln
Apache
releases a fix for
the vuln
An exploit
is made
available
through
exploitDB
Attacks
begins
immediately
after the
exploit is
made
available
Lessons learned
1. Detect fast: Make sure to automatically
monitor for new vulns and that your
database is up-to-date
2. Respond fast: Automated fixing into the
process
3. Do it at scale: with more than 1000 vulns
discovered each year, the scalable way to
find-fix is to empower devs to be the
implementers
;--7+=)F17.
Chaos Engineering
Chaos Engineering is a disciplined approach to
identifying failures before they become outages. -
Internet
How?
● Understand the infrastructure and the environments
● Security Differently
● Open-Source Tools
● Automation
● Compliance
● Security Monitoring
Z+*"'(+*+"3/."+*'=.&#$"'1(/+"*,-&,**.&,-
● Incident response
● Security control validation
● Security observability
● Compliance monitoring
O'Reilly book on security chaos engineering by Rinehart and
Kelly Shortridge.
People Process Technology
For DevSecOps to succeed
Inviting Dev and Ops to participate in Security Activities
Interacts with multiple departments, assets & resources
Embrace the automation
https://blogs.iadb.org/caribbean-dev-trends/wp-content/uploads/sites/34/2019/06/CCB-Automation-blog.jpg
Create more Security Champions
Ref:- https://safecode.org/wp-content/uploads/2019/01/champs-pic-768x549.png
Cross Skilling
https://www.accuprosys.com/wp-content/uploads/2014/09/42.jpg
Empower Dev /Ops to
deliver better and
faster and secure,
instead of blocking.
https://wondercratekids.files.wordpress.com/2017/11/wc_blog_develop-growth-mindset_empower.jpg
Making security as part of the everyday process
The goal: Ownership change
Top to Bottom
Shift Left
Team Sport
Unsplash.com
Key takeaways
● Prepare your Umbrella Before it Rains
(Early AppSec in Pipeline)
● Security is everyone’s responsibilities
● DevSecOps won’t replace your
pentesting activity
● Create a Parallel security pipeline for
more in-depth testing
● Don’t take on risk to generate business
value
References:-
● https://dzone.com/articles/shifting-left-devsecops
● https://www.verica.io/blog/security-chaos-engineering-how-to-security-
differently/automate-early-often
● https://www.oreilly.com/library/view/security-chaos-engineering/9781492080350/
● https://www.rsa.com/en-us/blog/2020-12/securing-chaos-how-security-chaos-engineering-
tools-can-improve-design-and-response
● https://www.threatstack.com/blog/security-observability-operationalizing-data-in-
complex-distributed-systems
● https://searchcloudsecurity.techtarget.com/tip/How-to-build-a-cloud-security-
observability-strategy
● https://www.trendmicro.com/en_in/devops/21/f/how-to-achieve-more-security-
observability.html
Reach Me!
Twitter: @InfosecVandana
LinkedIn: vandana-verma
Thank you!

More Related Content

What's hot

Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the Cloud
Amazon Web Services
 

What's hot (20)

DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
Extensible dev secops pipelines with Jenkins, Docker, Terraform, and a kitche...
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
DevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOpsDevSecCon London 2018: Open DevSecOps
DevSecCon London 2018: Open DevSecOps
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOps
 
Successfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the CloudSuccessfully Implementing DEV-SEC-OPS in the Cloud
Successfully Implementing DEV-SEC-OPS in the Cloud
 
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF LoftDevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
DevSecOps, An Organizational Primer - AWS Security Week at the SF Loft
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Talk DevSecOps to me
Talk DevSecOps to meTalk DevSecOps to me
Talk DevSecOps to me
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Dev secops. Real experience.
Dev secops. Real experience.Dev secops. Real experience.
Dev secops. Real experience.
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Hacker Games & DevSecOps
Hacker Games & DevSecOpsHacker Games & DevSecOps
Hacker Games & DevSecOps
 
Microsoft DevOps Forum 2021 – DevOps & Security
 Microsoft DevOps Forum 2021 – DevOps & Security Microsoft DevOps Forum 2021 – DevOps & Security
Microsoft DevOps Forum 2021 – DevOps & Security
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 

Similar to Building security into the pipelines

Similar to Building security into the pipelines (20)

The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
AppSensor Near Real-Time Event Detection and Response - DevNexus 2016
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
Making DevSecOps a Reality in your Spring Applications
Making DevSecOps a Reality in your Spring ApplicationsMaking DevSecOps a Reality in your Spring Applications
Making DevSecOps a Reality in your Spring Applications
 
Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or less
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
Defining DevSecOps
Defining DevSecOpsDefining DevSecOps
Defining DevSecOps
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
Strengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or lessStrengthen and Scale Security for a dollar or less
Strengthen and Scale Security for a dollar or less
 
Overcoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsOvercoming Security Challenges in DevOps
Overcoming Security Challenges in DevOps
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
Introducing DevSecOps by Madhu Akula - Software Security Bangalore - May 27 2...
 
Product Security
Product SecurityProduct Security
Product Security
 
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
 

More from Vandana Verma

Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0
Vandana Verma
 

More from Vandana Verma (18)

Applying OWASP web security testing guide (OWSTG)
Applying OWASP web security testing guide (OWSTG)Applying OWASP web security testing guide (OWSTG)
Applying OWASP web security testing guide (OWSTG)
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec Village
 
SARCON Talk - Vandana Verma Sehgal
SARCON Talk - Vandana Verma SehgalSARCON Talk - Vandana Verma Sehgal
SARCON Talk - Vandana Verma Sehgal
 
Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0
 
Addo 2019 vandana_dev_secops_culturalchange
Addo 2019 vandana_dev_secops_culturalchangeAddo 2019 vandana_dev_secops_culturalchange
Addo 2019 vandana_dev_secops_culturalchange
 
App Sec village DevSecOps as a culture
App Sec village DevSecOps as a cultureApp Sec village DevSecOps as a culture
App Sec village DevSecOps as a culture
 
Oscp - Journey
Oscp - JourneyOscp - Journey
Oscp - Journey
 
Web sockets - Pentesting
Web sockets - Pentesting Web sockets - Pentesting
Web sockets - Pentesting
 
Story of http headers
Story of http headersStory of http headers
Story of http headers
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Basics of Server Side Template Injection
Basics of Server Side Template InjectionBasics of Server Side Template Injection
Basics of Server Side Template Injection
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
 
Importance of Penetration Testing
Importance of Penetration TestingImportance of Penetration Testing
Importance of Penetration Testing
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
OWASP - Dependency Check
OWASP - Dependency CheckOWASP - Dependency Check
OWASP - Dependency Check
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in Cloud
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Recently uploaded (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Building security into the pipelines