Introduction to DevSecOps

A presentation at PagerDuty Summit in June 2021 in by Quintessence Anx

Slide 1

Slide 1

Introduction to DevSecOps Quintessence Anx

Slide 2

Slide 2

Quintessence Anx Developer Advocate, PagerDuty

Slide 3

Slide 3

Mandi Walls Developer Advocate, PagerDuty Nasim Yazdani Program Manager, PagerDuty

Slide 4

Slide 4

Getting Started If you have not already joined, please create a community account at community.pagerduty.com/join/pdu We will have a variety of sessions and workshop breakouts to test your knowledge throughout the course in our community. Redeem points for swag! ● ● ● Introductions 2 Knowledge Checks Post-Course Survey

Slide 5

Slide 5

📸 Doppler Team

Slide 6

Slide 6

Earn Points! 📝 Link in Chat

Slide 7

Slide 7

Agenda 1 Introduction 2 What is DevSecOps? 3 Cultural Shifts 4 Shifting Left 5 Q&A

Slide 8

Slide 8

Don’t Panic

Slide 9

Slide 9

This will be an interactive workshop, as much as possible

Slide 10

Slide 10

I’ll be doing (some) live questions in the presentation.

Slide 11

Slide 11

Questions will be via Slido

Slide 12

Slide 12

And so it begins…

Slide 13

Slide 13

Introduction & Context Setting

Slide 14

Slide 14

How do you feel development, operations, and security work together today? ⓘ Start presenting to display the poll results on this slide.

Slide 15

Slide 15

Dev+Ops: how do you feel when you need to work with security? Security: how do you feel when you need to work with dev and/or ops? ⓘ Start presenting to display the poll results on this slide.

Slide 16

Slide 16

Slide 17

Slide 17

A few questions about The Phoenix Project

Slide 18

Slide 18

Have you read The Phoenix Project? ⓘ Start presenting to display the poll results on this slide.

Slide 19

Slide 19

How well do you recall the story overall? ⓘ Start presenting to display the poll results on this slide.

Slide 20

Slide 20

Which character do you most identify with, in terms of your current role or career? ⓘ Start presenting to display the poll results on this slide.

Slide 21

Slide 21

Slide 22

Slide 22

A Basic Phoenix Project Org Chart

Slide 23

Slide 23

A Basic Phoenix Project Org Chart

Slide 24

Slide 24

Let’s reflect on this for a moment

Slide 25

Slide 25

How favorably did Bill talk about developers? ⓘ Start presenting to display the poll results on this slide.

Slide 26

Slide 26

How favorably did Bill talk about security? ⓘ Start presenting to display the poll results on this slide.

Slide 27

Slide 27

How did you view security in this interaction? ⓘ Start presenting to display the poll results on this slide.

Slide 28

Slide 28

Empathy exercise: how do you think security felt in this interaction, or in parallel real world scenarios? ⓘ Start presenting to display the poll results on this slide.

Slide 29

Slide 29

Let’s discuss.

Slide 30

Slide 30

What and How of DevSecOps

Slide 31

Slide 31

What was that all about? 🤨

Slide 32

Slide 32

Current Situation

Slide 33

Slide 33

Slide 34

Slide 34

Vaulting over “the wall”

Slide 35

Slide 35

Slide 36

Slide 36

Slide 37

Slide 37

DevSecOps

Slide 38

Slide 38

DevSecOps is the set of cultural practices that aims to break down the silo between security and development+operations.

Slide 39

Slide 39

Specifically, DevSecOps seeks to address the organizational friction that exists between these teams and departments.

Slide 40

Slide 40

What DevSecOps is not

Slide 41

Slide 41

DevSecOps is not replacing security with dev and/or ops, or expecting dev and/or ops to become security specialists, or expecting security to become devs and/or ops.

Slide 42

Slide 42

Phew.

Slide 43

Slide 43

Slide 44

Slide 44

DevSecOps is supported by both human activity and tooling.

Slide 45

Slide 45

The first step on your DevSecOps journey: awareness.

Slide 46

Slide 46

Best Practices are a Journey, not a One Size Fits All

Slide 47

Slide 47

There are a lot of Best Practices relevant to DevSecOps - so you’ll need to be aware of self and organization to be able to apply and iterate.

Slide 48

Slide 48

Curious: How many of you are interested in cross discipline learning? ⓘ Start presenting to display the poll results on this slide.

Slide 49

Slide 49

What are some ideas you have for implementing DevSecOps in your company? ⓘ Start presenting to display the poll results on this slide.

Slide 50

Slide 50

DevSecOps is implemented by …

Slide 51

Slide 51

Cultural Changes: Cross Functional Awareness and Empathy

Slide 52

Slide 52

Shifting Left in the Secure Software Development Life Cycle

Slide 53

Slide 53

Security Incident Remediation Process

Slide 54

Slide 54

Let’s talk culture first

Slide 55

Slide 55

Cultural Changes

Slide 56

Slide 56

Cultural Aptitude & Empathy

Slide 57

Slide 57

Blameless Culture

Slide 58

Slide 58

Full Service Ownership

Slide 59

Slide 59

Shadowing

Slide 60

Slide 60

By helping each other, we help ourselves.

Slide 61

Slide 61

Security Champions Program

Slide 62

Slide 62

What are some ways you can support a DevSecOps transformation at your company? ⓘ Start presenting to display the poll results on this slide.

Slide 63

Slide 63

Shifting Left

Slide 64

Slide 64

Secure SDLC

Slide 65

Slide 65

What are some security activities? ⓘ Start presenting to display the poll results on this slide.

Slide 66

Slide 66

Another Secure SDLC

Slide 67

Slide 67

Why is it called “shift left”?

Slide 68

Slide 68

An FTL Overview

Slide 69

Slide 69

Secure Design and Code

Slide 70

Slide 70

Secure Building, Testing, Delivery, & Deployment

Slide 71

Slide 71

Secure Runtime and Monitoring

Slide 72

Slide 72

Your Mileage May Vary

Slide 73

Slide 73

Everyone is relevant

Slide 74

Slide 74

Improve Security Posture

Slide 75

Slide 75

Security Posture

Slide 76

Slide 76

A company’s security posture is their overall readiness against security threats.

Slide 77

Slide 77

What are some ways that your security team helps improve your security posture? ⓘ Start presenting to display the poll results on this slide.

Slide 78

Slide 78

Always Ask

Slide 79

Slide 79

�� What do you do even do here? ⛔

Slide 80

Slide 80

�� How do you help us with ${X}? ✅

Slide 81

Slide 81

Security Assessments

Slide 82

Slide 82

Threat Modeling Exercises

Slide 83

Slide 83

Capture the Flag Games

Slide 84

Slide 84

Socially Engineer Trainings

Slide 85

Slide 85

Do not trick staff, ever

Slide 86

Slide 86

Example Security Training Slides

Slide 87

Slide 87

How many of you have attended a standard security training and received benefit from it? ⓘ Start presenting to display the poll results on this slide.

Slide 88

Slide 88

Slide 89

Slide 89

Slide 90

Slide 90

Slide 91

Slide 91

Slide 92

Slide 92

Slide 93

Slide 93

Slide 94

Slide 94

Security Training Ops Guide

Slide 95

Slide 95

Do you think a training like that would be more beneficial to your organization? ⓘ Start presenting to display the poll results on this slide.

Slide 96

Slide 96

True or false: Once we do All The Things we will be secure, forever! ⓘ Start presenting to display the poll results on this slide.

Slide 97

Slide 97

Secure Incident Response

Slide 98

Slide 98

Security & Incident Response

Slide 99

Slide 99

A security incident is an incident that actually or potentially violates the security policies of a system or information that the system processes, stores, and/or transmits.

Slide 100

Slide 100

When to trigger a security incident

Slide 101

Slide 101

What happens next?

Slide 102

Slide 102

The Fourteen Steps 1. Stop the attack in progress. 2. Cut off the attack vector. 3. Assemble the response team. 4. Isolate affected instances. 5. Identify timeline of attack. 6. Identify compromised data. 7. Assess risk to other systems. 9. Apply additional mitigations, additions to monitoring, etc. 10. Forensic analysis of compromised systems. 11. Internal communication. 12. Involve law enforcement. 13. Reach out to external parties that may have been used as vector for attack. 14. External communication. 8. Assess risk of re-attack.

Slide 103

Slide 103

Step 1: Stop the attack in progress.

Slide 104

Slide 104

Step 2: Cut off the attack vector.

Slide 105

Slide 105

Step 3: Assemble the response team.

Slide 106

Slide 106

Step 4: Isolate affected instances.

Slide 107

Slide 107

Step 5: Identify timeline of attack

Slide 108

Slide 108

Step 6: Identify compromised data.

Slide 109

Slide 109

Step 7: Assess risk to other systems.

Slide 110

Slide 110

Step 8: Assess risk of re-attack.

Slide 111

Slide 111

Step 9: Apply additional mitigations, additions to monitoring, etc.

Slide 112

Slide 112

Step 10: Forensic analysis of compromised systems.

Slide 113

Slide 113

Step 11: Internal communication

Slide 114

Slide 114

Step 12: Involve law enforcement.

Slide 115

Slide 115

Step 13: Reach out to external parties that may have been used as a vector for attack.

Slide 116

Slide 116

Step 14: External communication

Slide 117

Slide 117

The Fourteen Steps (Recap) 1. Stop the attack in progress. 2. Cut off the attack vector. 3. Assemble the response team. 4. Isolate affected instances. 5. Identify timeline of attack. 6. Identify compromised data. 7. Assess risk to other systems. 9. Apply additional mitigations, additions to monitoring, etc. 10. Forensic analysis of compromised systems. 11. Internal communication. 12. Involve law enforcement. 13. Reach out to external parties that may have been used as vector for attack. 14. External communication. 8. Assess risk of re-attack.

Slide 118

Slide 118

References and Resources

Slide 119

Slide 119

Resources PagerDuty DevSecOps Guide devsecops.pagerduty.com All PagerDuty Ops Guides - including security training pagerduty.com/ops-guides/ STRIDE Threat Modeling Framework ThoughtWorks Implementation Link About Capture the Flag (for InfoSec) ctf101.org Resources also available at the PagerDuty University Booth

Slide 120

Slide 120

📸 Purple Team

Slide 121

Slide 121

Final Exam! (Kidding, but really earn some points ☺) Link in Chat

Slide 122

Slide 122

Thank You Final Swag Challenge: Survey (in chat)