DevSecOps: What Why and How?

BlackHat USA 2019

07 August 2019

Video of the talk

Presentation: DevSecOps: What Why and How

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This expanded 50-slide presentation by Anant Shrivastava at Black Hat USA 2019 provides a comprehensive guide to DevSecOps β€” integrating security into DevOps pipelines through both automation and cultural transformation. Building on the core “What, Why, and How” framework, this version adds significant depth with detailed breakdowns of each pipeline stage, language-specific tooling matrices, cloud-native DevSecOps implementations across AWS/Azure/GCP, sample lab demonstrations for Ruby/PHP/Python/Node.js, real-world case studies from organizations like Fannie Mae and ABN Amro, and a critical discussion on securing the security toolchain itself (“Who Watches the Watcher”). The presentation positions DevSecOps as a multi-pillar strategy encompassing People, Process, and Technology.

Key Topics Covered

Actionable Takeaways

  1. Map your full DevOps pipeline and inject security at every stage from pre-commit through production monitoring β€” use the detailed pipeline architecture as a reference blueprint.
  2. Optimize your pipeline for speed by tailoring security scans to the type of change (skip SCA for CSS changes, skip SAST for dependency-only changes), but ensure a full unoptimized scan runs periodically.
  3. Select language-specific SAST and SCA tools for each technology in your stack rather than relying solely on multi-language tools like SonarQube.
  4. When migrating to cloud, map your existing security tooling to cloud-native equivalents using the AWS/Azure/GCP comparison matrix, and identify gaps that still require third-party tools.
  5. Implement the three-pillar Security Enablers model (People, Process, Technology) β€” involve security from the design phase, build a Security Champions program, and templatize security tooling per language/platform.
  6. Secure your security toolchain with the same rigor you apply to production systems β€” an attacker who controls your CI/CD pipeline or security tools has unlimited power.
  7. Validate DevSecOps effectiveness through periodic penetration testing and continuous bug bounty programs, and treat feedback as actionable items rather than filing risk acceptance documentation as a first resort.
  8. Study the Fannie Mae and ABN Amro case studies for practical lessons on organizational DevSecOps adoption at scale.

Social chatter