Page 72 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 72

Figure 2: Example of a DevSecOps CI/CD Pipeline


            When providing on-demand security capabilities, our services must be stable, accurate, and capable of
            meeting the demand. We only get one opportunity to get it right; if our services are not reliable, developers
            will lose confidence in our systems and in us. This will adversely impact our ability to influence software
            delivery                                                                                   practices.

            We can use a variety of tools and techniques to help development teams incorporate security into their
            processes including:
                     Being present and practicing active listening
                     Conduct threat modeling sections & secure design reviews
                     Help developers create attacker’s user stories
                     Provide development teams with secure libraries, SDKs, and scripts
                     Establish on-demand vulnerability and code quality scanning capabilities
                     Automate penetration testing as much as possible
                     Bug bounties
                     Automate compliance (compliance as code)

            In  summary,  security  is  everyone’s  responsibility.  DevSecOps  principles  and  processes  give  us  the
            highest opportunity to enable developers to deliver secure software and services to our customers.












                                 72
   67   68   69   70   71   72   73   74   75   76   77