DevOps and SecOps - Best Friends Forever
June 04, 2018

Mukul Kumar
Cavirin Systems

There is no better approach than starting from a clean slate, but in business reality this is not always possible. It's more complex than just merging the two different schools of thought. DevOps and security traditionally have been siloed functions and security is often seen as a policing function by DevOps team members. However, more mature business leaders are trying to bridge the gap between the two functions to achieve business excellence. This theme was evident from our recent survey where 39% of respondents cited that DevOps and development teams care greatly about their cybersecurity posture, showing that the silo between security/IT and development teams is diminishing.

It's important to understand that when every business is relying on digital technologies to make a difference, the only thing that differentiates one business from another is new capabilities/functionalities provided to their customers. The organizations which provide these functionalities first will clearly lead the market and increase value to their businesses. Yes, speed is the obvious common denominator here, but with speed comes various complexities and risk. Businesses that find the right balance between merging both schools of thought, with agile methodology, are getting ahead in the game.

The execution speed required to achieve this new business reality can only be achieved through the adoption of the cloud at various levels. The DevOps teams have already been aggressively leveraging a DevOps integrated fabric for IAAS and PAAS. This maturity in cloud deployment will slowly start moving towards an immutable model of deployment and then toward FAAS (Function-as-a-Service) which will provide a more integrated and robust framework.

With the adoption of these new models, organizations can no longer rely on old techniques and models which were more serial and reactive in their approach. Today, with DevOps leveraging the cloud for agility, security models need to be integrated into the development process and need to be part of mandatory control checks before production release.

Organizations have started realizing that incorporation of security from the design phase will increase the ROI of their DevOps program and will be more successful in creating lasting business value. Relying on a once-per-quarter pen testing-only approach solves only point-in-time issues and, as a result, becomes costlier. Instead, there must be continuous security oversight and integration to fix security flaws before they become a problem and exploited in the wild. The matured and unique combination of DevOps and security is predictive, integrated "DevSecOps."

Here are 3 suggested approaches to enable continuous security and DevOps when leveraging the cloud:

All infrastructure deployment for IAAS, PAAS, FAAS (Function-as a-Service) in software

All the building blocks of cloud infrastructure from IAAS, PAAS to FAAS should be controlled in code by DevOps. The goal here is to make the environment more reliable, predictable and mutable by replacing the whole system in no time if required by simply changing the code. There will be no guess work involved because all the "recipes" will keep the information about the current and past versions intact. This will not only enforce the logic of version controls but will also provide the much-required capability of rollback to a stable version of code when something goes sideways. This whole approach to the infrastructure will simplify the old back-up and restoration operation model.

API driven security architecture and "Say NO to complex access rules"

Instead of point-in-time assessments by using security tools and leveraging monolithic architecture techniques, security should instead be integrated into code development through APIs.

With the current lack of security talent, there is a possibility that the security team will not be able gain full visibility and detailed information into the compute environment if it's not automated and integrated into a robust CI/CD pipeline. All the security tool vendors will have to provide a standard RESTful API integration with good documentation for the DevOps team. The DevOps team should use this method to build integration for continuous assessment and automated remediation once issues/exploits are detected.

Create a well-defined development environment

TEST, TEST and TEST. We cannot emphasize the importance of investing time and energy for setting up your test environment. Even the best of developers make mistakes – and who doesn't, we are human after all – but a solid test environment gives one the ability to fix issues before they get released into production. Apart from the feature, functionality, speed and business logic, we must pay special attention to issues but not be limited to security vulnerabilities, security best practices and industry guidelines from NIST, API exposure, performance etc.

The cloud is ever-changing but along with that comes an ever-changing set of "tools" to secure it. Thanks to DevOps and SecOps, organizations should no longer be left in the dust as it relates to their approach to security. With an agile cloud available to each organization, it's important to use the right set of tools for the job. Thankfully, security and DevOps have a life-long friendship to look forward to, as together, they can heavily help get the job done right.

Mukul Kumar is CISO and VP of Cybersecurity Practice at Cavirin Systems

The Latest

August 16, 2018

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

Share this