DevSecOps Automating Security in DevOps

IP Expo Manchester 2019

03 April 2019

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation by Anant Shrivastava at IPExpo Manchester 2019 delivers a focused 26-slide overview of DevSecOps β€” automating security within DevOps pipelines. Covering the what, why, and how of DevSecOps, the talk walks through the business case for shifting security left, the specific security controls that should be integrated at each pipeline stage, tool selection criteria, cloud security considerations, the cultural changes required for success, the Security Champions model, and real-world case studies illustrating both prevention strategies and the consequences of neglected security. The presentation frames DevSecOps through the lens of three security enablers: People, Process, and Technology.

Key Topics Covered

Actionable Takeaways

  1. Audit your current DevOps pipeline and identify gaps where security controls are missing β€” map each stage (pre-commit through production) against the DevSecOps pipeline framework presented.
  2. Apply the 15-minute execution rule when evaluating security tools for pipeline integration, and require machine-readable output (JSON/XML) to enable automated processing and vulnerability management.
  3. Implement pre-commit hooks as a first line of defense against credential leakage, but treat them as one layer in a defense-in-depth strategy since they can be bypassed.
  4. Establish a Security Champions program with one representative per development team, supported by internal bug bounties and cross-skilling opportunities to build a security-conscious culture organically.
  5. For cloud environments, expand security monitoring beyond application-level concerns to include IAM policies, billing anomalies, security group configurations, and comprehensive asset inventory.
  6. Adopt the People-Process-Technology enablers framework β€” involve security from the ideation phase, prioritize fixes by risk, and templatize security tooling per language/platform for consistency.
  7. Complement automated DevSecOps controls with periodic penetration testing and bug bounty programs, and establish a culture of acting on findings rather than defaulting to risk acceptance.
  8. Start small and iterate β€” DevSecOps is not one-size-fits-all, and every environment is different. Test and validate tools and processes before broad implementation.

Social chatter