DevSecOps What Why

Blackhat Asia 2019

28 March 2019

The video of the session is available now

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation by Anant Shrivastava at BlackHat ASIA 2019 introduces DevSecOps — the practice of integrating security into DevOps pipelines to achieve “Secure by Default” outcomes. Delivered in a concise 25-slide format, the talk covers the what, why, and how of DevSecOps, walking through the concept of shifting security left in the development lifecycle, the specific tooling categories that can be automated within CI/CD pipelines, the cultural changes required to make DevSecOps successful, and real-world case studies demonstrating what happens when security is neglected. The presentation emphasizes that DevSecOps is not a one-size-fits-all solution and requires both automation and organizational culture shifts.

Key Topics Covered

Actionable Takeaways

  1. Start by mapping your current DevOps pipeline and identifying where security checks can be injected at each stage — pre-commit, build, post-build, staging, and production.
  2. Implement pre-commit hooks (Git Hound, truffleHog) to catch secrets and credentials before they enter the repository, but treat them as defense-in-depth rather than sole protection.
  3. Adopt the “15-minute rule” for pipeline tools — any security tool in the CI/CD pipeline should complete within 15 minutes and produce machine-readable output.
  4. Establish a Security Champions program with one representative per team to bridge the gap between development, security, and operations.
  5. Prioritize Software Composition Analysis (SCA) alongside SAST, as the majority of modern software consists of third-party libraries with potential vulnerabilities.
  6. For cloud environments, expand your security focus to include IAM policies, billing monitoring, security groups, and asset inventory — not just application-level vulnerabilities.
  7. Remember that DevSecOps is both automation and culture — invest equally in tooling and in fostering a security-conscious mindset across all teams.
  8. Validate all tools and approaches in your specific environment before full implementation, as every environment is different and your mileage will vary.

Social chatter