Colin Domoney -

19
Join the conversation #devseccon By Colin Domoney How does a traditional security team cope with a move to DevOps?

Transcript of Colin Domoney -

Page 1: Colin Domoney -

Join the conversation #devseccon

By Colin Domoney

How does a traditional security team cope with a move to DevOps?

Page 2: Colin Domoney -

About MeContact Information

https://www.linkedin.com/in/colindomoney

@colindomoney

[email protected]

Page 3: Colin Domoney -
Page 4: Colin Domoney -

Our Storyboard

• Building a Security Team•How Not to Engage with Development and Operations•Developers are from Mars, Security are from Venus•What We Did Differently

Page 5: Colin Domoney -

What I Thought I Needed …Name: Crash “I void warranties” OveRide

Page 6: Colin Domoney -

What My Human Resources Brought Me …Name: Jordan Belfort CISSP, CSSLP, CISM, CISA, CIPT, CIPM, CEH, OSCP, PTO …

Page 7: Colin Domoney -

What I Actually Needed …

Page 8: Colin Domoney -

LONDON, ENGLANDFriday, 17h37

Page 9: Colin Domoney -

Let’s meet our hero – our Developer

Page 10: Colin Domoney -

The town sheriff – the Operations team

Page 11: Colin Domoney -

The monster – the Security team

Page 12: Colin Domoney -

”Security Gate”

Development UAT/SIT Production

Page 13: Colin Domoney -

REACTIVE“Non compliant”“Not meeting policy”“Blocked”“Exception from senior management”“Risk acceptance”“30 day deadline”“Risk assessment”

Page 14: Colin Domoney -

PROACTIVE“Let’s discuss a remediation plan”“Here’s a Wiki page on dealing with that”“You’re using a vulnerable component”“Here’s a code sample that shows you how”“There’s a new version of that library”“You should do a new static scan”“You’ve fixed all your flaws”

Page 15: Colin Domoney -

PRAGMATICDon’t do ”check box complianceNegotiate a timescale for remediationAppreciate not all flaws need to be fixedPrioritise remediation activityEnd goal is risk reduction, not compliance

Page 16: Colin Domoney -

• Able to communicate with the Developers• Understood their release cycles, environments, challenges• Identified common ‘anti-patterns’ in their software• Provided code snippets and remediation guidance• Identified ’second party’ components and their owners• Identified vulnerable OSS and COTS packages• Pragmatic approach to remediation• Use new technology when relevant

What Did We Do Differently

Page 17: Colin Domoney -

What Does The Future Look Like?

Page 18: Colin Domoney -

Help Developers to Help Themselves

Page 19: Colin Domoney -

Join the conversation #devseccon

Thanks for your time!

Visit us on the stand, or contact me for further

information.