SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
© 2015 , we45 1
Security in DevOps
Concept Presentation
Topics of Discussion
Current State of Application Delivery
Current Challenges with Application Security
The Application Driven Enterprise Goal
The we45 SecDevOps Framework
© 2015 , we45 2
Current State of Application Delivery
Massive Decrease in Application Delivery and Deployment Timelines:
Amazon ships code every 12 seconds.
Increased Use of Agile Development Practices in the SDLC
Increased Adoption of Cloud for Application Delivery
Increased Adoption of DevOps practices to:
Reduce friction between Development and Operations
Increase Collaboration in all areas of Application Delivery
Leverage Continuous Integration, Delivery and Deployment to release code to production
faster
Leverage Automation – To increase Throughput
© 2015 , we45 3
© 2015 , we45 4
Today – The Application Driven Economy
© 2015 , we45 5
Attributes of an Application Driven Enterprise
Throughput – Revenue generated from delivering
apps to customers
Operating Resources– Resources expended to
generate Throughput
© 2015 , we45 6
The Goal
© 2015 , we45 7
Increase Throughput while
simultaneously reducing the Operating
Resources
© 2015 , we45 8
4 in 5
Cost	
  of	
  fixing	
  a	
  security	
  
bug,	
  in	
  production.
200
Average	
  Number	
  of	
  Days	
  
required	
  to	
  fix	
  a	
  
high/medium	
   security	
  bug
$30K
Managers	
  and	
  Product	
  
Engineering	
   Heads	
  see	
  
Security	
  as	
  the	
  biggest	
  
bottleneck
74%Number	
  of	
  Apps	
  with	
  
atleast one	
  serious	
  
vulnerability
The
Numbers
App security bottleneck – blocking the release
© 2015 , we45 9
Requirements Design Develop Test Security	
  Test
Releases are blocked until security vulnerabilities are fixed, resulting in:
• Higher Operational Resources to fix Security Bugs
• Slower Release Cycles
• Slower Throughput
• Breakdown of Agile and DevOps
App security bottleneck – security iterations
© 2015 , we45 10
Requirements Design Develop Test Security	
  Test
Release	
  to	
  
Customer
Apps cannot be used until security vulnerabilities are fixed, resulting in:
• Higher Sales Cycle – reducing Throughput
• Unhappy Customers
• Higher of Cost of Development to fix Security Issues – Higher
Operational Resources
Customer rejects the app till security vulnerabilities are fixed.
Security Flaws always do the following:
Break down the Agile and DevOps lifecycle
Cause reduction of Application Delivery Throughput
Result in Lower Customer Satisfaction
Increase time and resources in fixing security flaws
© 2015 , we45 11
we45 SecDevOps Framework
Designed to Integrate Security into the organization’s DevOps
practices
Combination of Training + Consulting + Implementation =>
Delivering Maximum Impact on Application Security through a Multi-
Pronged Approach
Guaranteed to meet the goal:
Increase Throughput while reducing Operational Resources in Application
Delivery
© 2015 , we45 12
How does it work?
It is a combination of the following:
System and Component Driven Threat
Modeling + Security By Design
Custom Security Automation Suite –
integrated with CI (Continuous DAST)
Automated Security Testing –
Integrated with Continuous
Deployment
Post-Deployment Security Validation
© 2015 , we45 13
Threat	
  Modeling	
  
and	
  Secure	
  By	
  
Design
SAST	
  and	
  
Continuous	
  
DAST
Pre	
  &	
  Post	
  
Deployment	
  
Security	
  
Testing
A Highlight of the SecDevOps Approach
© 2015 , we45
14
Product	
  Backlog	
  -­‐
Requirements
Sprint	
  Backlog	
  -­‐
Sprint	
  
Requirements
Design
DevelopIntegrate
Test
Release
Requirements
Design	
  and	
  
Prototype
Development,	
  
Iterations,	
  Prototype
Testing
Release	
  and	
  
Deploy Security	
  Risk	
  Assessment	
  +	
  
Threat	
  Model
Security	
  Design	
  Review
Peer	
  Code	
  Review	
  
+	
  Training
Customized	
  
Automated	
  Security	
  
Testing	
  in	
  CI
Security	
  in	
  Release	
  
and	
  Config
Management
© 2015 , we45 15
Threat Modeling + Security By Design
Threat Modeling is essential in integrating
security into the SDLC.
Threat Modeling done at the System and
specific component level provides micro and
macro perspectives
Threat Modeling – Valuable Input for Security
Testing and Security Automation
Serves as Valuable Input for Security By Design
we45’s SecDevOps Framework => STRIDE Threat
Modeling with DREAD for measurement
STRIDE
•Spoofing
•Tampering
•Repudiation
•Information	
  
Disclosure
•Denial	
  of	
  Service
•Elevation	
  of	
  Privileges
DREAD
•Damage
•Reproducibility
•Exploitability
•Affected	
  Users
•Discoverability
© 2015 , we45 16
Custom Security Automation Suite
Current State of Application Security Testing
(DAST):
Only 30-40% of Security Vulnerabilities are identified
through Security Testing Tools (Automated tools)
Manual Application Security Testing is slow…
we45’s SecDevOps Framework incorporates a
hybrid approach:
Perform Automated Test through Automated Tools
Provide Custom Security Scripts to simulate manual
application security testing
Integrate the entire suite with Continuous Integration
Application	
  
Security	
  
Testing	
  (DAST)	
  
-­‐ 100%	
  
Coverage
Automated	
  
Vulnerability	
  
Assessment	
  
Tools
Custom	
  
Automation	
  of	
  
Manual	
  
Security	
  Tests
© 2015 , we45 17
Benefits – Custom Security Automation Suite
Perform a High Quality Penetration Test for EVERY RELEASE!! (Not quarterly/bi-
annual/annual)
Integrated with CI – Build Fails if Security has failed. No escape from fixing security
flaws
Greater Visibility – Complete Reporting of Tests, Payloads and Pass/Fail Information
Combination of Manual and Automated => 100% Vulnerability/Parameter
Coverage
Issues can be re-created and repeated without Penetration Testers being involved.
Granular Vulnerability Management using we45’s VME (Vulnerability Management
Engine)
Coverage – Custom Security Automation Suite
© 2015 , we45 18
OWASP/SANS/WASC	
  
Vulnerabilities
Specialized	
  Business	
  
Logic	
  Vulnerabilities
Identify	
  
Vulnerabilities	
  -­‐
Insecure	
  Platform	
  
Libraries	
  and	
  Third	
  
Party	
  API
Vulnerabilities	
  in	
  the	
  
Network	
  and	
  OS	
  
Layer
© 2015 , we45 19
Automated Testing – Continuous Deployment
Automated Test Suite integrated with Continuous
Deployment products/standalone, to perform:
Host and OS Security Checks
Vulnerabilities in App Servers, DBs, NoSQL DBs, etc
Vulnerabilities in Network Configurations
Integrate with Continuous Deployment Products like Chef,
Ansible, Puppet, etc.
© 2015 , we45 20
Additional Elements – we45 SecDevOps Framework
Automated Static Code Analysis (SAST)
Designing a security oriented Continuous Monitoring Strategy
Focused Training Workshops for Different Teams:
Certified Web Security Professional (Developing Secure Web Apps and Web Services) –
Developers and Architects
Certified Mobile Security Professional (Developing Secure Mobile Apps and Web Services) –
Developers and Architects
Certified SecDevOps Professional (Comprehensive Insight into implementing SecDevOps for
your organization) – Developers, Architects, Operations Personnel, DevOps Engineers
© 2015 , we45 21
Conclusions
DevOps or Agile without Security is ineffective
Security is usually the most pervasive bottleneck
we45’s SecDevOps Framework ensures that Security is
integrated into the SDLC and DevOps Framework
This results in achievement of Enterprise Goals of:
Higher Throughput through Application Delivery with a simaltaneous reduction in
Operating Resources
thank you
22© 2015 , we45

Mais conteúdo relacionado

Mais procurados

Security in a Continuous Delivery World
Security in a Continuous Delivery WorldSecurity in a Continuous Delivery World
Security in a Continuous Delivery WorldDinis Cruz
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
Using jira to manage risks   v1.0 - owasp app sec eu - june 2016Using jira to manage risks   v1.0 - owasp app sec eu - june 2016
Using jira to manage risks v1.0 - owasp app sec eu - june 2016Dinis Cruz
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps JourneySonatype
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owaspDag Rowe
 
Automating OWASP Tests in your CI/CD
Automating OWASP Tests in your CI/CDAutomating OWASP Tests in your CI/CD
Automating OWASP Tests in your CI/CDrkadayam
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017Suman Sourav
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemWhiteSource
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case StudyAndy Hoernecke
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines Abdul_Mujeeb
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)Qualitest
 
Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1Gary Stafford
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and OpportunitiesMohammed A. Imran
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps JourneyVeracode
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareSeniorStoryteller
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive SecurityAndy Hoernecke
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and ObservabilityWhy Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and ObservabilityEficode
 

Mais procurados (20)

Security in a Continuous Delivery World
Security in a Continuous Delivery WorldSecurity in a Continuous Delivery World
Security in a Continuous Delivery World
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
Using jira to manage risks   v1.0 - owasp app sec eu - june 2016Using jira to manage risks   v1.0 - owasp app sec eu - june 2016
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 
Automating OWASP Tests in your CI/CD
Automating OWASP Tests in your CI/CDAutomating OWASP Tests in your CI/CD
Automating OWASP Tests in your CI/CD
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017
 
Barriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome ThemBarriers to Container Security and How to Overcome Them
Barriers to Container Security and How to Overcome Them
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case Study
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)DevSecOps - It can change your life (cycle)
DevSecOps - It can change your life (cycle)
 
Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1Infrastructure as Code Maturity Model v1
Infrastructure as Code Maturity Model v1
 
DevSecOps OWASP
DevSecOps OWASPDevSecOps OWASP
DevSecOps OWASP
 
[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities[DevSecOps Live] DevSecOps: Challenges and Opportunities
[DevSecOps Live] DevSecOps: Challenges and Opportunities
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged Software
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and ObservabilityWhy Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and Observability
 

Destaque

Frozen Food Markets in China By Asia Market Information & Development Company
Frozen Food Markets in China By Asia Market Information & Development CompanyFrozen Food Markets in China By Asia Market Information & Development Company
Frozen Food Markets in China By Asia Market Information & Development CompanyMarketResearch.com
 
Autismoa
AutismoaAutismoa
Autismoaoia
 
Integración de Recursos educativos Web 2.0 personales
Integración de Recursos educativos Web 2.0 personalesIntegración de Recursos educativos Web 2.0 personales
Integración de Recursos educativos Web 2.0 personalesSelene Contreras
 
Kommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zu
Kommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zuKommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zu
Kommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zuEllwanger & Geiger Privatbankiers
 
NABE 2015 Presentation Keeley Sorokti
NABE 2015 Presentation Keeley SoroktiNABE 2015 Presentation Keeley Sorokti
NABE 2015 Presentation Keeley SoroktiKeeley Sorokti
 
Introduction to Threat Modeling
Introduction to Threat ModelingIntroduction to Threat Modeling
Introduction to Threat Modelingslicklash
 
Categorias de estetica
Categorias de esteticaCategorias de estetica
Categorias de esteticaPaulina Islas
 
#JavaOne What's in an object?
#JavaOne What's in an object?#JavaOne What's in an object?
#JavaOne What's in an object?Charlie Gracie
 
Remindo a terra consagrando a nação
Remindo a terra consagrando a naçãoRemindo a terra consagrando a nação
Remindo a terra consagrando a naçãoAlex Santos
 
Data Mining with SpagoBI suite
Data Mining with SpagoBI suiteData Mining with SpagoBI suite
Data Mining with SpagoBI suiteSpagoWorld
 
Digital locker
Digital lockerDigital locker
Digital lockerAbhinav Kp
 
IBM Storage for Hybrid Cloud (4Q 2016)
IBM Storage for Hybrid Cloud (4Q 2016)IBM Storage for Hybrid Cloud (4Q 2016)
IBM Storage for Hybrid Cloud (4Q 2016)Elan Freedberg
 
IIA1: Industrial Control Systems 101 (Predix Transform 2016)
IIA1: Industrial Control Systems 101 (Predix Transform 2016)IIA1: Industrial Control Systems 101 (Predix Transform 2016)
IIA1: Industrial Control Systems 101 (Predix Transform 2016)Predix
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityImperva Incapsula
 
22º Encontro - Sacramentos de Cura e Serviços
22º Encontro - Sacramentos de Cura e Serviços22º Encontro - Sacramentos de Cura e Serviços
22º Encontro - Sacramentos de Cura e ServiçosCatequese Anjos dos Céus
 

Destaque (20)

Ed 1 2012_anatel
Ed 1 2012_anatelEd 1 2012_anatel
Ed 1 2012_anatel
 
Frozen Food Markets in China By Asia Market Information & Development Company
Frozen Food Markets in China By Asia Market Information & Development CompanyFrozen Food Markets in China By Asia Market Information & Development Company
Frozen Food Markets in China By Asia Market Information & Development Company
 
Autismoa
AutismoaAutismoa
Autismoa
 
Integración de Recursos educativos Web 2.0 personales
Integración de Recursos educativos Web 2.0 personalesIntegración de Recursos educativos Web 2.0 personales
Integración de Recursos educativos Web 2.0 personales
 
Ita2009 1dia
Ita2009 1diaIta2009 1dia
Ita2009 1dia
 
Kommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zu
Kommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zuKommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zu
Kommentar zum Immobilienaktienmarkt: Europäische Immobilienaktien legen zu
 
NABE 2015 Presentation Keeley Sorokti
NABE 2015 Presentation Keeley SoroktiNABE 2015 Presentation Keeley Sorokti
NABE 2015 Presentation Keeley Sorokti
 
Delito cibernético
Delito cibernéticoDelito cibernético
Delito cibernético
 
Top 25 Presentation
Top 25 PresentationTop 25 Presentation
Top 25 Presentation
 
Introduction to Threat Modeling
Introduction to Threat ModelingIntroduction to Threat Modeling
Introduction to Threat Modeling
 
Categorias de estetica
Categorias de esteticaCategorias de estetica
Categorias de estetica
 
#JavaOne What's in an object?
#JavaOne What's in an object?#JavaOne What's in an object?
#JavaOne What's in an object?
 
Remindo a terra consagrando a nação
Remindo a terra consagrando a naçãoRemindo a terra consagrando a nação
Remindo a terra consagrando a nação
 
Data Mining with SpagoBI suite
Data Mining with SpagoBI suiteData Mining with SpagoBI suite
Data Mining with SpagoBI suite
 
Digital locker
Digital lockerDigital locker
Digital locker
 
IBM Storage for Hybrid Cloud (4Q 2016)
IBM Storage for Hybrid Cloud (4Q 2016)IBM Storage for Hybrid Cloud (4Q 2016)
IBM Storage for Hybrid Cloud (4Q 2016)
 
IIA1: Industrial Control Systems 101 (Predix Transform 2016)
IIA1: Industrial Control Systems 101 (Predix Transform 2016)IIA1: Industrial Control Systems 101 (Predix Transform 2016)
IIA1: Industrial Control Systems 101 (Predix Transform 2016)
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
22º Encontro - Sacramentos de Cura e Serviços
22º Encontro - Sacramentos de Cura e Serviços22º Encontro - Sacramentos de Cura e Serviços
22º Encontro - Sacramentos de Cura e Serviços
 
Protoplast fusion
Protoplast fusionProtoplast fusion
Protoplast fusion
 

Semelhante a we45 - SecDevOps Concept Presentation

Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesAvi Networks
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security StrategySmartBear
 
DTS-1778 Understanding DevOps - IBM InterConnect Session
DTS-1778 Understanding DevOps - IBM InterConnect SessionDTS-1778 Understanding DevOps - IBM InterConnect Session
DTS-1778 Understanding DevOps - IBM InterConnect SessionSanjeev Sharma
 
AAIC Cloud Engineering and DevOps overview v2.3.pdf
AAIC Cloud Engineering and DevOps overview v2.3.pdfAAIC Cloud Engineering and DevOps overview v2.3.pdf
AAIC Cloud Engineering and DevOps overview v2.3.pdfAppliedAIConsulting
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Achim D. Brucker
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsSuman Sourav
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks Ulf Mattsson
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXNGINX, Inc.
 
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...RapidValue
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSEric Smalling
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps TransformationMichele Chubirka
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development Rogue Wave Software
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through EducationGrant Ongers
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020Brian Levine
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Kevin Fealey
 

Semelhante a we45 - SecDevOps Concept Presentation (20)

Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery Pipelines
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
 
DTS-1778 Understanding DevOps - IBM InterConnect Session
DTS-1778 Understanding DevOps - IBM InterConnect SessionDTS-1778 Understanding DevOps - IBM InterConnect Session
DTS-1778 Understanding DevOps - IBM InterConnect Session
 
AAIC Cloud Engineering and DevOps overview v2.3.pdf
AAIC Cloud Engineering and DevOps overview v2.3.pdfAAIC Cloud Engineering and DevOps overview v2.3.pdf
AAIC Cloud Engineering and DevOps overview v2.3.pdf
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
 
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
Live Webinar- Making Test Automation 10x Faster for Continuous Delivery- By R...
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps Transformation
 
Navigating agile automotive software development
Navigating agile automotive software development Navigating agile automotive software development
Navigating agile automotive software development
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 

Último

20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 

Último (20)

20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 

we45 - SecDevOps Concept Presentation

  • 1. © 2015 , we45 1 Security in DevOps Concept Presentation
  • 2. Topics of Discussion Current State of Application Delivery Current Challenges with Application Security The Application Driven Enterprise Goal The we45 SecDevOps Framework © 2015 , we45 2
  • 3. Current State of Application Delivery Massive Decrease in Application Delivery and Deployment Timelines: Amazon ships code every 12 seconds. Increased Use of Agile Development Practices in the SDLC Increased Adoption of Cloud for Application Delivery Increased Adoption of DevOps practices to: Reduce friction between Development and Operations Increase Collaboration in all areas of Application Delivery Leverage Continuous Integration, Delivery and Deployment to release code to production faster Leverage Automation – To increase Throughput © 2015 , we45 3
  • 4. © 2015 , we45 4
  • 5. Today – The Application Driven Economy © 2015 , we45 5
  • 6. Attributes of an Application Driven Enterprise Throughput – Revenue generated from delivering apps to customers Operating Resources– Resources expended to generate Throughput © 2015 , we45 6
  • 7. The Goal © 2015 , we45 7 Increase Throughput while simultaneously reducing the Operating Resources
  • 8. © 2015 , we45 8 4 in 5 Cost  of  fixing  a  security   bug,  in  production. 200 Average  Number  of  Days   required  to  fix  a   high/medium   security  bug $30K Managers  and  Product   Engineering   Heads  see   Security  as  the  biggest   bottleneck 74%Number  of  Apps  with   atleast one  serious   vulnerability The Numbers
  • 9. App security bottleneck – blocking the release © 2015 , we45 9 Requirements Design Develop Test Security  Test Releases are blocked until security vulnerabilities are fixed, resulting in: • Higher Operational Resources to fix Security Bugs • Slower Release Cycles • Slower Throughput • Breakdown of Agile and DevOps
  • 10. App security bottleneck – security iterations © 2015 , we45 10 Requirements Design Develop Test Security  Test Release  to   Customer Apps cannot be used until security vulnerabilities are fixed, resulting in: • Higher Sales Cycle – reducing Throughput • Unhappy Customers • Higher of Cost of Development to fix Security Issues – Higher Operational Resources Customer rejects the app till security vulnerabilities are fixed.
  • 11. Security Flaws always do the following: Break down the Agile and DevOps lifecycle Cause reduction of Application Delivery Throughput Result in Lower Customer Satisfaction Increase time and resources in fixing security flaws © 2015 , we45 11
  • 12. we45 SecDevOps Framework Designed to Integrate Security into the organization’s DevOps practices Combination of Training + Consulting + Implementation => Delivering Maximum Impact on Application Security through a Multi- Pronged Approach Guaranteed to meet the goal: Increase Throughput while reducing Operational Resources in Application Delivery © 2015 , we45 12
  • 13. How does it work? It is a combination of the following: System and Component Driven Threat Modeling + Security By Design Custom Security Automation Suite – integrated with CI (Continuous DAST) Automated Security Testing – Integrated with Continuous Deployment Post-Deployment Security Validation © 2015 , we45 13 Threat  Modeling   and  Secure  By   Design SAST  and   Continuous   DAST Pre  &  Post   Deployment   Security   Testing
  • 14. A Highlight of the SecDevOps Approach © 2015 , we45 14 Product  Backlog  -­‐ Requirements Sprint  Backlog  -­‐ Sprint   Requirements Design DevelopIntegrate Test Release Requirements Design  and   Prototype Development,   Iterations,  Prototype Testing Release  and   Deploy Security  Risk  Assessment  +   Threat  Model Security  Design  Review Peer  Code  Review   +  Training Customized   Automated  Security   Testing  in  CI Security  in  Release   and  Config Management
  • 15. © 2015 , we45 15 Threat Modeling + Security By Design Threat Modeling is essential in integrating security into the SDLC. Threat Modeling done at the System and specific component level provides micro and macro perspectives Threat Modeling – Valuable Input for Security Testing and Security Automation Serves as Valuable Input for Security By Design we45’s SecDevOps Framework => STRIDE Threat Modeling with DREAD for measurement STRIDE •Spoofing •Tampering •Repudiation •Information   Disclosure •Denial  of  Service •Elevation  of  Privileges DREAD •Damage •Reproducibility •Exploitability •Affected  Users •Discoverability
  • 16. © 2015 , we45 16 Custom Security Automation Suite Current State of Application Security Testing (DAST): Only 30-40% of Security Vulnerabilities are identified through Security Testing Tools (Automated tools) Manual Application Security Testing is slow… we45’s SecDevOps Framework incorporates a hybrid approach: Perform Automated Test through Automated Tools Provide Custom Security Scripts to simulate manual application security testing Integrate the entire suite with Continuous Integration Application   Security   Testing  (DAST)   -­‐ 100%   Coverage Automated   Vulnerability   Assessment   Tools Custom   Automation  of   Manual   Security  Tests
  • 17. © 2015 , we45 17 Benefits – Custom Security Automation Suite Perform a High Quality Penetration Test for EVERY RELEASE!! (Not quarterly/bi- annual/annual) Integrated with CI – Build Fails if Security has failed. No escape from fixing security flaws Greater Visibility – Complete Reporting of Tests, Payloads and Pass/Fail Information Combination of Manual and Automated => 100% Vulnerability/Parameter Coverage Issues can be re-created and repeated without Penetration Testers being involved. Granular Vulnerability Management using we45’s VME (Vulnerability Management Engine)
  • 18. Coverage – Custom Security Automation Suite © 2015 , we45 18 OWASP/SANS/WASC   Vulnerabilities Specialized  Business   Logic  Vulnerabilities Identify   Vulnerabilities  -­‐ Insecure  Platform   Libraries  and  Third   Party  API Vulnerabilities  in  the   Network  and  OS   Layer
  • 19. © 2015 , we45 19 Automated Testing – Continuous Deployment Automated Test Suite integrated with Continuous Deployment products/standalone, to perform: Host and OS Security Checks Vulnerabilities in App Servers, DBs, NoSQL DBs, etc Vulnerabilities in Network Configurations Integrate with Continuous Deployment Products like Chef, Ansible, Puppet, etc.
  • 20. © 2015 , we45 20 Additional Elements – we45 SecDevOps Framework Automated Static Code Analysis (SAST) Designing a security oriented Continuous Monitoring Strategy Focused Training Workshops for Different Teams: Certified Web Security Professional (Developing Secure Web Apps and Web Services) – Developers and Architects Certified Mobile Security Professional (Developing Secure Mobile Apps and Web Services) – Developers and Architects Certified SecDevOps Professional (Comprehensive Insight into implementing SecDevOps for your organization) – Developers, Architects, Operations Personnel, DevOps Engineers
  • 21. © 2015 , we45 21 Conclusions DevOps or Agile without Security is ineffective Security is usually the most pervasive bottleneck we45’s SecDevOps Framework ensures that Security is integrated into the SDLC and DevOps Framework This results in achievement of Enterprise Goals of: Higher Throughput through Application Delivery with a simaltaneous reduction in Operating Resources