SlideShare uma empresa Scribd logo
1 de 25
DevSecOps
KieranJacobsen
Readify
POSHSECURITY.COM
@KJACOBSEN
Kieran
Jacobsen
• Head of Information
Technology at Readify
• Microsoft MVP, Cloud and
Datacenter Management
POSHSECURITY.COM
@KJACOBSEN
POSHSECURITY.COM
POSHSECURITY.COM
@KJACOBSEN
POSHSECURITY.COM
@KJACOBSEN
POSHSECURITY.COM
@KJACOBSEN
Training
Communicati
on
Integration
POSHSECURITY.COM
@KJACOBSEN
Code
4 Componentsto DevSecOps
NO!
• Excel Checklists
• Word Document or PDFReports
• Email Attachments
POSHSECURITY.COM
@KJACOBSEN
Yes!
• Backlogs
POSHSECURITY.COM
@KJACOBSEN
Yes!
• Backlogs
• Support/Ticket Tools
POSHSECURITY.COM
@KJACOBSEN
“Jackofalltrades,masterofnone,though
oftenbetterthanamasterofone”
POSHSECURITY.COM
@KJACOBSEN
AdamSavage
POSHSECURITY.COM
POSHSECURITY.COM
@KJACOBSEN
azuredeploy.json
POSHSECURITY.COM
@KJACOBSEN
azuredeploy.json
POSHSECURITY.COM
@KJACOBSEN
azuredeploy.parameters.json
POSHSECURITY.COM
@KJACOBSEN
POSHSECURITY.COM
@KJACOBSEN
Images courtesyof The Registerand Dan Tentler
POSHSECURITY.COM
@KJACOBSEN
POSHSECURITY.COM
@KJACOBSEN
Plan
• Integratesecurity into sprint planning and reviews
• Consider security stories early
POSHSECURITY.COM
@KJACOBSEN
Code
• Training!
• Test drivendevelopment
• Useof thecorrect tools
• Pull Requests
POSHSECURITY.COM
@KJACOBSEN
Build
• Linting tools
• Static code analysis
POSHSECURITY.COM
@KJACOBSEN
Test
• Security focused cases
• Fuzzing
• Load testing
POSHSECURITY.COM
@KJACOBSEN
Release and Deploy
• Automated vulnerabilityassessment tools
POSHSECURITY.COM
@KJACOBSEN
Operate and Monitor
• Monitor logs – Behavior and patterns
• Continuouslymonitor for vulnerabilities
• Monitor dependency packages and software
Thank You!
Readify.net
POSHSECURITY.COM
@KJACOBSEN
PoshSecurity.com

Mais conteúdo relacionado

Mais procurados

Need for speed: Tips to Optimize your Website
Need for speed: Tips to Optimize your WebsiteNeed for speed: Tips to Optimize your Website
Need for speed: Tips to Optimize your WebsiteAnne Thomas
 
Update Smart: Use a staging site!
Update Smart: Use a staging site!Update Smart: Use a staging site!
Update Smart: Use a staging site!Meagan Hanes
 
Changing Rules for Startups: Charles Hudson, Precursor
Changing Rules for Startups: Charles Hudson, PrecursorChanging Rules for Startups: Charles Hudson, Precursor
Changing Rules for Startups: Charles Hudson, PrecursorAmazon Web Services
 
Understanding Content Management Services
Understanding Content Management ServicesUnderstanding Content Management Services
Understanding Content Management Services360ideas
 
Geek Sync | How to Deal with an Inherited SQL Server
Geek Sync | How to Deal with an Inherited SQL ServerGeek Sync | How to Deal with an Inherited SQL Server
Geek Sync | How to Deal with an Inherited SQL ServerIDERA Software
 
Best Practices for Web Infrastructure on Amazon Web Services
Best Practices for Web Infrastructure on Amazon Web ServicesBest Practices for Web Infrastructure on Amazon Web Services
Best Practices for Web Infrastructure on Amazon Web ServicesBrett Gillett
 
WooCommerce Security - WordCamp OC 2018
WooCommerce Security - WordCamp OC 2018WooCommerce Security - WordCamp OC 2018
WooCommerce Security - WordCamp OC 2018Jamie Schmid
 
WordCamp 2012 - Seth Carstens Presentation (Responsive Width)
WordCamp 2012 - Seth Carstens Presentation (Responsive Width)WordCamp 2012 - Seth Carstens Presentation (Responsive Width)
WordCamp 2012 - Seth Carstens Presentation (Responsive Width)Seth Carstens
 
Bootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting timeBootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting timeJoel Gascoigne
 
10 Must Have WordPress Plugins
10 Must Have WordPress Plugins10 Must Have WordPress Plugins
10 Must Have WordPress PluginsAffiliate Summit
 
CBE16 - using technology to grow your business
CBE16 - using technology to grow your businessCBE16 - using technology to grow your business
CBE16 - using technology to grow your businessCraftBev
 
10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP SiteFLBlogCon
 
What's my WordPress site's email strategy
What's my WordPress site's email strategyWhat's my WordPress site's email strategy
What's my WordPress site's email strategyBecs Kemm
 
Know This, Work Here
Know This, Work HereKnow This, Work Here
Know This, Work HereDale Cruse
 
Forcelandia 19 How to Use Flow to Become a Developer
Forcelandia 19 How to Use Flow to Become a DeveloperForcelandia 19 How to Use Flow to Become a Developer
Forcelandia 19 How to Use Flow to Become a DeveloperMeighan Brodkey
 
Custom blog plugins by ben edwards
Custom blog plugins by ben edwardsCustom blog plugins by ben edwards
Custom blog plugins by ben edwardsPhilip Taylor
 
Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...
Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...
Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...Cprime
 
Serverless WordPress using AWS Services - WordCamp Atlanta 2017
Serverless WordPress using AWS Services - WordCamp Atlanta 2017Serverless WordPress using AWS Services - WordCamp Atlanta 2017
Serverless WordPress using AWS Services - WordCamp Atlanta 2017Carel Bekker
 
Computer network it assignment help
Computer network it assignment helpComputer network it assignment help
Computer network it assignment helpabc assignment help
 

Mais procurados (20)

My website is live now what?
My website is live now what?My website is live now what?
My website is live now what?
 
Need for speed: Tips to Optimize your Website
Need for speed: Tips to Optimize your WebsiteNeed for speed: Tips to Optimize your Website
Need for speed: Tips to Optimize your Website
 
Update Smart: Use a staging site!
Update Smart: Use a staging site!Update Smart: Use a staging site!
Update Smart: Use a staging site!
 
Changing Rules for Startups: Charles Hudson, Precursor
Changing Rules for Startups: Charles Hudson, PrecursorChanging Rules for Startups: Charles Hudson, Precursor
Changing Rules for Startups: Charles Hudson, Precursor
 
Understanding Content Management Services
Understanding Content Management ServicesUnderstanding Content Management Services
Understanding Content Management Services
 
Geek Sync | How to Deal with an Inherited SQL Server
Geek Sync | How to Deal with an Inherited SQL ServerGeek Sync | How to Deal with an Inherited SQL Server
Geek Sync | How to Deal with an Inherited SQL Server
 
Best Practices for Web Infrastructure on Amazon Web Services
Best Practices for Web Infrastructure on Amazon Web ServicesBest Practices for Web Infrastructure on Amazon Web Services
Best Practices for Web Infrastructure on Amazon Web Services
 
WooCommerce Security - WordCamp OC 2018
WooCommerce Security - WordCamp OC 2018WooCommerce Security - WordCamp OC 2018
WooCommerce Security - WordCamp OC 2018
 
WordCamp 2012 - Seth Carstens Presentation (Responsive Width)
WordCamp 2012 - Seth Carstens Presentation (Responsive Width)WordCamp 2012 - Seth Carstens Presentation (Responsive Width)
WordCamp 2012 - Seth Carstens Presentation (Responsive Width)
 
Bootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting timeBootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting time
 
10 Must Have WordPress Plugins
10 Must Have WordPress Plugins10 Must Have WordPress Plugins
10 Must Have WordPress Plugins
 
CBE16 - using technology to grow your business
CBE16 - using technology to grow your businessCBE16 - using technology to grow your business
CBE16 - using technology to grow your business
 
10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site
 
What's my WordPress site's email strategy
What's my WordPress site's email strategyWhat's my WordPress site's email strategy
What's my WordPress site's email strategy
 
Know This, Work Here
Know This, Work HereKnow This, Work Here
Know This, Work Here
 
Forcelandia 19 How to Use Flow to Become a Developer
Forcelandia 19 How to Use Flow to Become a DeveloperForcelandia 19 How to Use Flow to Become a Developer
Forcelandia 19 How to Use Flow to Become a Developer
 
Custom blog plugins by ben edwards
Custom blog plugins by ben edwardsCustom blog plugins by ben edwards
Custom blog plugins by ben edwards
 
Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...
Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...
Admins Anonymous - the 5 step program for recovering Jira Admins. Atlassian S...
 
Serverless WordPress using AWS Services - WordCamp Atlanta 2017
Serverless WordPress using AWS Services - WordCamp Atlanta 2017Serverless WordPress using AWS Services - WordCamp Atlanta 2017
Serverless WordPress using AWS Services - WordCamp Atlanta 2017
 
Computer network it assignment help
Computer network it assignment helpComputer network it assignment help
Computer network it assignment help
 

Semelhante a DevSecOps: 4 Components to Integrate Security into the DevOps Lifecycle

Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Brian Ritchie
 
Spca2014 sp ci with tfs online and azure matthias einig
Spca2014 sp ci with tfs online and azure matthias einigSpca2014 sp ci with tfs online and azure matthias einig
Spca2014 sp ci with tfs online and azure matthias einigNCCOMMS
 
Rapid Fullstack Development
Rapid Fullstack DevelopmentRapid Fullstack Development
Rapid Fullstack DevelopmentAshley Davis
 
Who wants to be a DBA? Roles and Responsibilities
Who wants to be a DBA? Roles and ResponsibilitiesWho wants to be a DBA? Roles and Responsibilities
Who wants to be a DBA? Roles and ResponsibilitiesKevin Kline
 
How to MBSE Pt.3 - Configuration Management.pptx
How to MBSE Pt.3 - Configuration Management.pptxHow to MBSE Pt.3 - Configuration Management.pptx
How to MBSE Pt.3 - Configuration Management.pptxElizabeth Steiner
 
Inside Wordnik's Architecture
Inside Wordnik's ArchitectureInside Wordnik's Architecture
Inside Wordnik's ArchitectureTony Tam
 
Microservices with Node.js - Livestreamed for Manning
Microservices with Node.js - Livestreamed for ManningMicroservices with Node.js - Livestreamed for Manning
Microservices with Node.js - Livestreamed for ManningAshley Davis
 
WordCamp 2012 - WordPress Webapps
WordCamp 2012 - WordPress WebappsWordCamp 2012 - WordPress Webapps
WordCamp 2012 - WordPress Webappstjasko
 
Cutter gen culture_doc
Cutter gen culture_docCutter gen culture_doc
Cutter gen culture_doclrcutter
 
Transform Legacy Data Stores with Microsoft Azure and Precisely
Transform Legacy Data Stores with Microsoft Azure and PreciselyTransform Legacy Data Stores with Microsoft Azure and Precisely
Transform Legacy Data Stores with Microsoft Azure and PreciselyPrecisely
 
My personal story from azure it pro to azure dev ops
My personal story from azure it pro to azure dev opsMy personal story from azure it pro to azure dev ops
My personal story from azure it pro to azure dev opsnj-azure
 
Microservices Journey Summer 2017
Microservices Journey Summer 2017Microservices Journey Summer 2017
Microservices Journey Summer 2017Christian Posta
 
Dev/Test in the Cloud - F
Dev/Test in the Cloud - FDev/Test in the Cloud - F
Dev/Test in the Cloud - FChris Riley ☁
 
Career Day - Data Developer
Career Day - Data DeveloperCareer Day - Data Developer
Career Day - Data DeveloperAaron King
 
Migrating Data and Databases to Azure
Migrating Data and Databases to AzureMigrating Data and Databases to Azure
Migrating Data and Databases to AzureKaren Lopez
 
Enabling your DevOps culture with AWS-webinar
Enabling your DevOps culture with AWS-webinarEnabling your DevOps culture with AWS-webinar
Enabling your DevOps culture with AWS-webinarAaron Walker
 
Ohio Devfest - Visual Analysis with GCP
Ohio Devfest - Visual Analysis with GCPOhio Devfest - Visual Analysis with GCP
Ohio Devfest - Visual Analysis with GCPWesley Workman
 
NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...
NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...
NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...anynines GmbH
 
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismBen Johnson
 

Semelhante a DevSecOps: 4 Components to Integrate Security into the DevOps Lifecycle (20)

Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011
 
Spca2014 sp ci with tfs online and azure matthias einig
Spca2014 sp ci with tfs online and azure matthias einigSpca2014 sp ci with tfs online and azure matthias einig
Spca2014 sp ci with tfs online and azure matthias einig
 
Rapid Fullstack Development
Rapid Fullstack DevelopmentRapid Fullstack Development
Rapid Fullstack Development
 
Who wants to be a DBA? Roles and Responsibilities
Who wants to be a DBA? Roles and ResponsibilitiesWho wants to be a DBA? Roles and Responsibilities
Who wants to be a DBA? Roles and Responsibilities
 
How to MBSE Pt.3 - Configuration Management.pptx
How to MBSE Pt.3 - Configuration Management.pptxHow to MBSE Pt.3 - Configuration Management.pptx
How to MBSE Pt.3 - Configuration Management.pptx
 
Inside Wordnik's Architecture
Inside Wordnik's ArchitectureInside Wordnik's Architecture
Inside Wordnik's Architecture
 
Microservices with Node.js - Livestreamed for Manning
Microservices with Node.js - Livestreamed for ManningMicroservices with Node.js - Livestreamed for Manning
Microservices with Node.js - Livestreamed for Manning
 
WordCamp 2012 - WordPress Webapps
WordCamp 2012 - WordPress WebappsWordCamp 2012 - WordPress Webapps
WordCamp 2012 - WordPress Webapps
 
Cutter gen culture_doc
Cutter gen culture_docCutter gen culture_doc
Cutter gen culture_doc
 
Continuous database deployment
Continuous database deploymentContinuous database deployment
Continuous database deployment
 
Transform Legacy Data Stores with Microsoft Azure and Precisely
Transform Legacy Data Stores with Microsoft Azure and PreciselyTransform Legacy Data Stores with Microsoft Azure and Precisely
Transform Legacy Data Stores with Microsoft Azure and Precisely
 
My personal story from azure it pro to azure dev ops
My personal story from azure it pro to azure dev opsMy personal story from azure it pro to azure dev ops
My personal story from azure it pro to azure dev ops
 
Microservices Journey Summer 2017
Microservices Journey Summer 2017Microservices Journey Summer 2017
Microservices Journey Summer 2017
 
Dev/Test in the Cloud - F
Dev/Test in the Cloud - FDev/Test in the Cloud - F
Dev/Test in the Cloud - F
 
Career Day - Data Developer
Career Day - Data DeveloperCareer Day - Data Developer
Career Day - Data Developer
 
Migrating Data and Databases to Azure
Migrating Data and Databases to AzureMigrating Data and Databases to Azure
Migrating Data and Databases to Azure
 
Enabling your DevOps culture with AWS-webinar
Enabling your DevOps culture with AWS-webinarEnabling your DevOps culture with AWS-webinar
Enabling your DevOps culture with AWS-webinar
 
Ohio Devfest - Visual Analysis with GCP
Ohio Devfest - Visual Analysis with GCPOhio Devfest - Visual Analysis with GCP
Ohio Devfest - Visual Analysis with GCP
 
NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...
NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...
NSA - No thanks - Build your own cloud with OpenStack and Cloud Foundry | any...
 
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
 

Mais de kieranjacobsen

The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019kieranjacobsen
 
CrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security TalkCrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security Talkkieranjacobsen
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talkkieranjacobsen
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talkkieranjacobsen
 
Secure Azure Deployment Patterns
Secure Azure Deployment PatternsSecure Azure Deployment Patterns
Secure Azure Deployment Patternskieranjacobsen
 
Ransomware 0, Admins 1
Ransomware 0, Admins 1Ransomware 0, Admins 1
Ransomware 0, Admins 1kieranjacobsen
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minuteskieranjacobsen
 
Infrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpsInfrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpskieranjacobsen
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpskieranjacobsen
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017kieranjacobsen
 
Evolving your automation with hybrid workers
Evolving your automation with hybrid workersEvolving your automation with hybrid workers
Evolving your automation with hybrid workerskieranjacobsen
 
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data CentreGlobal Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centrekieranjacobsen
 
Azure automation invades your data centre
Azure automation invades your data centreAzure automation invades your data centre
Azure automation invades your data centrekieranjacobsen
 
Exploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShellExploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShellkieranjacobsen
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShellkieranjacobsen
 
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber DuckyFun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Duckykieranjacobsen
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShellkieranjacobsen
 
Enabling Enterprise Mobility
Enabling Enterprise MobilityEnabling Enterprise Mobility
Enabling Enterprise Mobilitykieranjacobsen
 
Advanced PowerShell Automation
Advanced PowerShell AutomationAdvanced PowerShell Automation
Advanced PowerShell Automationkieranjacobsen
 

Mais de kieranjacobsen (20)

The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
The Boring Security Talk - Azure Global Bootcamp Melbourne 2019
 
CrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security TalkCrikeyCon VI - The Boring Security Talk
CrikeyCon VI - The Boring Security Talk
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talk
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talk
 
Secure Azure Deployment Patterns
Secure Azure Deployment PatternsSecure Azure Deployment Patterns
Secure Azure Deployment Patterns
 
Ransomware 0, Admins 1
Ransomware 0, Admins 1Ransomware 0, Admins 1
Ransomware 0, Admins 1
 
Ransomware 0 admins 1
Ransomware 0 admins 1Ransomware 0 admins 1
Ransomware 0 admins 1
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minutes
 
Infrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOpsInfrastructure Saturday - Level Up to DevSecOps
Infrastructure Saturday - Level Up to DevSecOps
 
Dev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOpsDev Breakfast: Level up to DevSecOps
Dev Breakfast: Level up to DevSecOps
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
 
Evolving your automation with hybrid workers
Evolving your automation with hybrid workersEvolving your automation with hybrid workers
Evolving your automation with hybrid workers
 
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data CentreGlobal Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
Global Azure Bootcamp 2016 - Azure Automation Invades Your Data Centre
 
Azure automation invades your data centre
Azure automation invades your data centreAzure automation invades your data centre
Azure automation invades your data centre
 
Exploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShellExploiting MS15-034 In PowerShell
Exploiting MS15-034 In PowerShell
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber DuckyFun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Ducky
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Enabling Enterprise Mobility
Enabling Enterprise MobilityEnabling Enterprise Mobility
Enabling Enterprise Mobility
 
Advanced PowerShell Automation
Advanced PowerShell AutomationAdvanced PowerShell Automation
Advanced PowerShell Automation
 

Último

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Último (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

DevSecOps: 4 Components to Integrate Security into the DevOps Lifecycle

Notas do Editor

  1. Welcome to DevSecOps.
  2. My name is Kieran Jacobsen, I am the Head of Information Technology at Readify and a Microsoft MVP for Cloud and Datacenter Management.
  3. This has been a massive year for data breaches, there are four worth discussing. WannaCry made the press in a big way, primarily due to how it impacted the UK’s National Health Service. Attributed to the North Korean government, WannaCry left a wide range of NHS computer systems down, closing hospitals and diagnostic facilities. Speaking with medical professionals, including doctors, nurses, their response is that this attack likely resulted in people loosing their lives. Maesk Shipping, they handle one in seven shipping containers world wide, they fell victim to the NotPeta ransomware. NotPetya has been attributed to the Russian government, and severely impacted organisations who had Ukrainian based offices. Maersk has lost over 300 million dollars due to the attack and their global shipping operations were so heavily impacted that products from the likes of Apple were delayed being shipped to customers. Now of course, these were all overshadowed by the Equifax breach that resulted in the loss of over 143 million records. Now the last one is equally as interesting, especially for the audience here. Deloitte suffered a breach of a number of systems including their email. What was found in the days following their announcement were a number of obviously bad processes including things like publicly exposed domain controllers and credentials sitting in public GitHub repositories.
  4. So here we can see a development and operations team working prior to DevOps. Development would catapult new builds at operations, and they would return with a volley of bugs and issues. Apps were unstable, devployments a complex mess, and overall our organisations suffered.
  5. Along came DevOps, with a promise that we would get two waring factions to act as one. To unite them against a common enemy, users! DevOps has largely been a success, apps are more stable, releases simplified and faster.
  6. Unfortunately, in the rush, we left security concepts out of the equations. In the race to DevOps, organisations often forgot to include their own security teams. It is my belief that this is why we are now seeing the issues with insecurely deployed apps, databases, even things like load testing and disaster recovery been forgotten.
  7. So how do we move towards a DevSecOps model? Now I see that there are 4 core components, unified communication, quality training, ensuring you consider all of your code, and finally integrating the right tools into the right places.
  8. Excel is clunky, word can be hard to diff, and we should all by now know the risks of documents with macros!
  9. Backlogs and boards encourage collaboration, and ownership of tasks. Security issues and reviews do not produce reports, that produce tasks in a board.
  10. Don’t underestimate the power of support ticket tools. They encourage better working models, ownership of issues and better customer communication. These tools are not just for ops, but also for developers and security teams as well.
  11. Training is super critical, we can’t be experts, but we need to have awareness of the other parts of our team. Training needs to start for all areas of IT from day 0, and not just the basics. Developers need to be aware of your organisations of code quality, and this includes security.
  12. When we think about code, we usually thing about application source, but what about the other parts of your environment? Are you monitoring and reviewing ARM templates? What about Chef, Puppet and PowerShell DSC configurations?
  13. In this example, taken from the Azure Quick start templates, we see a configuration element relating to a Network Security Group, this one restricts traffic to RDP, port 3389. Unfortunately, they have allowed all the internet as a source address, so I guess someone will start brute forcing this box soon enough. Do you know if your developers are deploying from examples like this?
  14. Another example, this time we have an azure ARM template that deploys a virtual machine. It takes in a couple of parameters, specifically the local administrator username and password.
  15. To deploy this virtual machine, the developer has created a parameters file and specified the username, password and a dns label prefix. The dev runs the deployment, their virtual machine was created successfully. There isn’t anything for us to worry about right?
  16. Unfortunately, in their race to get home, the developer commits the changes to both the template and the parameters file into git, and then pushes that to the remote source. What if that was a public GitHub repo? Well then those credentials would be exposed for all the world to see. How would you go about detecting and monitoring for this?
  17. Exposed domain controllers and credentials on public GitHub repositories are exactly what we saw during the Deloitte breach. Training and monitoring is probably one of the best tools to prevent these types of issues.
  18. So how do we integrate security into DevOps? Where is the right place? The answer is, at every single step.
  19. When we plan, we need to involve security in both our sprint planning and reviews. I recommend considering security stories early due to their complexity; you don’t want to leave them till the end of a release cycle.
  20. Training is crucial to writing secure code, but its also worth considering methodologies like test driven development. Using the right tools is crucial; most IDEs have tools or plugins that will assist developers by highlighting potential security risks. Pull Requests are also crucial, code that contains security issues, doesn’t get merged.
  21. At the build phase, things like linting and static code analysis tools provide a way of automatically scanning our code to determine if there are any obvious vulnerabilities.
  22. Consider automating security focused testing, fuzzing and most importantly, because people like the ABS seem to forget, load testing.
  23. During the release and deployment phases, we have another opportunity to use automated scanning and assessment tools. Application vulnerability assessment tools, or even infrastructure assessment tools.
  24. In the final two steps, operate and monitor, there are quite a number of things we can do. Monitoring log files and looking for unusual behaviour or patterns is a great way of finding and preventing potential attacks. Do you keep an eye on the failed login attempts? What about successful ones? These metrics could be good indicators of attempts at brute forcing access. Now during the earlier phases, we used automated tools to look for vulnerabilities, and we should rerun these tools once our application has gone into production. With the breach of Equifax, Struts has become highly visible. Do you know if any of the software your applications or npm packages contain vulnerabilities? What is your process to upgrade these in your production environment?
  25. If you want to know more about Readify, please come and ask one of us here at the stand. I will be placing the slides on my website, PoshSecurity.com. Thank you all very much for listening to me. <applause> Does anyone have any questions.