• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»5 ways to secure devops
Security

5 ways to secure devops

September 12, 2022No Comments10 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
5 ways to secure devops
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


Devops teams are sacrificing focus on security gate reviews to meet tight time-to-market deadlines amid growing pressure to deliver digital transformation and digital-first revenue projects ahead of schedule. 

Compensation plans for CIOs, devops leaders, and their teams prioritize time-to-market performance, increasing the intensity to beat schedules. Over the last 18 months, 90% of IT leaders are also seeing digital transformation initiatives accelerate as enterprises strive to stay in step with their customers’ preferences for buying, receiving service and repeating purchases on a digital-first basis. 

A typical devops team in a $500 million enterprise has more than 200 concurrent projects in progress, with over 70% dedicated to safeguarding and improving digital customer experiences. Devops teams are looking to save every second they can on every project as a large percentage of their total compensation is on the line. 

Boston Consulting Group (BCG) says that the more software-intensive a business is, the faster and more effective the delivery of new offerings needs to be to create competitive advantages, making it a critical capability for long-term survival. Devops teams who can deliver minimum viable products (MVP) ahead of schedule often set the pace for an entire project. 

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

VentureBeat asked Janet Worthington, senior analyst, Forrester, if CISOs and CIOs are getting more involved in securing devops. She said that “yes, CISOs and CIOs more and more are realizing that to move fast and achieve business goals, teams need to embrace a secure devops culture. Developing an automated development pipeline allows teams to deploy frequently and confidently because security testing is embedded from the earliest stages. In the result a security issue escapes to production, having a repeatable pipeline allows for the offending code to be rolled back without impacting other operations and the issue corrected quickly.”

Why security gets traded for speed

With compensation, competitive advantages and the reputation of enterprise IT and devops teams on the line, it’s understandable that security gets pushed back in the software development lifecycle (SDLC). In enterprises that don’t prioritize security as a core part of the SDLC process, it’s common to find security, testing and validation systems isolated from core devops workflows. 

Often pushed to the final phases of a project, they’re rushed. That’s one of the main reasons enterprises that have suffered a breach in the previous 12 months say that the two leading methods bad actors used were taking advantage of vulnerable software and direct web application attacks.

Security testing apps isolated from devops platforms 

One example is how devops teams use application security testing (AST) tools and systems that aren’t integrated into development platforms or environments. Security testing software is designed for analysis and traceability. Devops apps, platforms and tools are designed for speed and transparency. Unfortunately, few devops engineers also know how to use security testing software. 

See also  How identity verification infrastructure as a service thwarts identity theft

Gate-driven reviews slow down devops

Devops workflows are designed for speed and rapidly iterating with the latest requirements and performance improvements. Gate reviews are static. The tools devops teams rely on for security testing can lead to roadblocks, given their gate-driven design. Devops is a continuous process in high-performance IT teams, while stage gates slow the pace of development. 

Devops teams aren’t trained on security

Devops leaders often don’t have the time to train their developers to integrate security from the initial phases of a project. The challenge is how few developers are trained on secure coding techniques. Forrester’s latest report on improving code security from devops teams looked at the top 50 undergraduate computer science programs in the US, as ranked by US News and World Report for 2022, and found that none require secure coding or a secure application design class.

Trading off security for compliance

CIOs and their teams are stretched thin with the many digital transformation initiatives, support for virtual teams and ongoing infrastructure support projects they have going on concurrently. CIOs and CISOs also face the challenges of keeping their organizations in regulatory compliance with more complex audit and reporting requirements. Fines and the potential impacts on an organization’s reputation force them to focus first on compliance at the expense of security. 

Security needs to be core to devops 

High-performing devops teams deploy code 208 times more frequently than low performers. Creating the foundation for devops teams to achieve that needs to start by including security from the initial design phases of any new project. Security must be defined in the initial product specs and across every devops cycle. The goal is to iteratively improve security as a core part of any software product.   

By integrating security into the SDLC, CIOs, CISOs, and their devops leaders gain valuable time back that would have been spent on stage gate reviews and follow-on meetings. The goal is to get devops and security teams continually collaborating by breaking down the system and process roadblocks that hold each team back. 

“Organizations that are pursuing zero-trust initiatives benefit from embracing a devops culture where all stakeholders — development, security, operations and IT — are responsible for the quality, security and reliability of applications they build, deploy and operate,” Worthington said. 

She continued, “When security is involved early in the development lifecycle, zero-trust requirements can be identified and built into the product. Organizations that don’t embed security in the SDLC run the risk that security issues are first identified late in the life cycle, requiring product rework and delayed release cycles.”

See also  Report: 90% of orgs have software security checkpoints in their software development lifecycle (SDLC)

The greater the collaboration, the greater the shared ownership of deployment rates, improvements in software quality and security metrics — core measures of each team’s performance. Securing devops needs to start with the following suggested strategies that are delivering results today:

Integrating security apps, tools and technologies into existing SDLC developer workflows

It’s the first step to improving how devops and security teams share goals and help identify potential roadblocks. It is also a valuable technique for helping devops and security teams start to collaborate and break down communication and process barriers that blocked progress before. For example, enterprises often begin the integration process by embedding software composition analysis (SCA) and application security testing (AST). These tools provide devops teams with greater visibility into their code’s flaws and vulnerabilities so they can work with security to resolve them. The goal is to make security apps and tools so accessible that devops engineers can quickly get up to speed and succeed at secure coding.

Track application security performance to make better devops decisions

Large-scale devops teams often have security technicians and engineers dedicated to different applications, codebases and teams. Their goal is to analyze how each of their areas is performing on core application security metrics while ensuring secure coding practices are happening. Over time, the data generated from tracking improvements in application security helps devops teams make more informed trade-off decisions. 

Key mean time-to-remediate allows devops teams to measure an average from the time an issue is identified to when the issue is resolved. Teams that track these types of metrics can see progress over time as they implement better design, coding practices and automated testing.  

Worthington says that benchmarks or metrics used by devops teams to measure their progress at making the SDLC process more secure need to include the percentage of applications that have security testing automated and integrated into the software development life cycle. The metrics should also include the percentage of applications that are covered by post-production protection technologies. 

“A positive trending indicates reduced risk to the business, reduction of unplanned work, and brand reputation protection,” Worthington advised.   

Recruit security coaches in devops and double down on their training

Encourage members of the devops teams to become security coaches, offering to pay for their certifications, training and ongoing education. Upskilling is most effective when it combines informal training from security engineers and formal training paid for by the organization, so devops team members can continually gain new knowledge. 

Close gaps between AST and devops to save time and improve security

Enterprise IT and security teams often pursue a shift-left strategy to make this happen. That involves creating more collaboration during the first stages of the SDLC by relying on software composition analysis and prioritizing what most needs to be done in the security requirements backlog. Closing the gap accelerates development and provides devops engineers with an opportunity to learn about AST. 

See also  Fintechs weather the storm: How disruptive technology is driving change

Leading vendors that provide platforms that integrate AST into devops include Coverity, Checkmarx, GitLab, HCL AppScan, Micro Focus Fortify On Demand, Veracode Application Security Platform and others. Checkmarx is noteworthy for its integrated approach that’s proven scalable across organizations doing daily code releases.

Checkmarx’s platform architecture is proving effective in closing the security gaps that can slow down code deployments. Source: Checkmarx.

The SDLC needs to have zero trust in the design starting at the API level to reduce the risk of a breach

Organizations must adopt zero-trust principles for all systems and processes that comprise the devops pipeline to secure their software supply chains from attacks and threats. 

VentureBeat recently asked Sandy Carielli, principal analyst at Forrester, how IT, devops and security can collaborate better to improve API security as part of the CI/CD process. Carielli said, “As in many security areas, early communication makes a big difference. During the early stages of product definition, security needs to be in the room and understand the API strategy for a product or project. This will help ensure that the team has the right expertise and supporting tools. In addition, work with IT and devops on a policy and controls for deploying new APIs to reduce the risk of rogue or unmanaged APIs.”

VentureBeat also asked Carielli what organizations should look for when evaluating which API security strategy for their organizations. She advised, “when considering API strategy, work with the dev team to understand the overall API strategy first. Get API discovery in place. Understand how existing appsec tools are or are not supporting API use cases. You will likely find overlaps and gaps. But it’s important to assess your environment for what you already have in place before running out to buy a bunch of new tools.”

Improving devops by integrating security 

Security needs to be a continuous, automated process in devops if it’s going to deliver on the potential it has to improve code deployment rates while reducing security risks and improving code quality. In addition, when security is a core part of the SDLC, its core metrics are available across devops teams and security engineers, further improving collaboration. 

Forrester’s latest report [subscription required] advises IT leaders to adopt AST tools that educate devops engineers on the job, further enhancing their knowledge. The report recommends static application security testing, dynamic application security testing, and interactive application security testing as the best tools for devops engineers to start with.

Forrester also advises IT and security leaders to look for tools that include clickable and brief training modules and can be inserted into the SDLC as early as possible, such as spellchecker-like plug-ins to the integrated developer environment (IDE).

Source link

devops secure Ways
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

3 Ways To Reduce Friction In Your Sales Process

September 23, 2023

10 Ways To Secure A Mentor And Grow As An Entrepreneur

September 14, 2023

3 Ways To Break Through The Digital Clutter To Increase Customer Retention

September 4, 2023

3 Ways To Set The Stage For Growth In Your Small Business

August 20, 2023
Add A Comment

Comments are closed.

Editors Picks

The 105 best shows on Hulu right now (July 2022)

July 8, 2022

Users warned over Azure Active Directory authentication flaw

September 14, 2022

WWE 2K22 update 1.15 addresses a number of issues

July 2, 2022

Is it value importing the Nothing Telephone 1?

July 21, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.