A Guide To Impliment DevSecOps
A Guide To Impliment DevSecOps
implementing
DevSecOps
by Will Kelly
We are Opensource.com
Recent supply chain breaches, plus President Biden's new Cybersecurity executive order, are
bringing renewed attention to DevSecOps' value for the enterprise. DevSecOps brings culture
changes, frameworks, and tools into open source software (OSS). To understand
DevSecOps, you must understand its relationship with OSS.
What is DevSecOps?
In its purest form, DevOps (which is an amalgamation of development and operations) is a
methodology for breaking down the traditional silos between programmers and system
administrators during the software delivery lifecycle. Corporations and government agencies
adopt DevOps for various reasons, including improving software delivery velocity to serve
customers better.
DevSecOps adds security into DevOps, further refining the concept to address code quality,
security, and reliability assurance through automation, enabling continuous security and
compliance. Organizations seeking to comply with Sarbanes Oxley (SOX), Payment Card
Industry Data Security Standard (PCI DSS), FedRAMP, and similar programs are candidates
for implementing DevSecOps.
For example, a federal government agency seeking FedRAMP compliance should use
DevSecOps, because it enables them to bake security automation into each stage of their
software development process. Likewise, a healthcare institution entrusted with sensitive
personal healthcare information (PHI) needs DevSecOps to ensure its cloud applications
meet HIPAA compliance requirements.
The more you move security mitigation to the left to tackle these issues in development, the
more money you save. You also avoid potential negative headlines because your teams don't
have to respond to issues in production, where remediation costs can soar far higher than if
you caught them in your development environment.
You can treat the move from DevOps to DevSecOps as another step in the DevOps journey.
But it's more like a transformation for your development organization and your entire
business. Here's a typical framework:
We're at a unique point in the history of software development, where the need to increase
security and speed software development velocity are at a crossroads. While DevOps has
done a lot to increase velocity, there was always more to do.
Growth of DevSecOps
The growth of DevSecOps has been visible in compliance and security-conscious arenas. For
example, it has a growing following inside the security-conscious US Department of Defense.
Projects such as Platform One are setting an example of how DevSecOps practices can
protect open source and cloud technologies in the most security-conscious government
missions.
DevSecOps has a 20% to 50% penetration within industry, according to Gartner's Hype Cycle
for Agile and DevOps, 2020. The pandemic has acted as a catalyst for DevSecOps as
organizations have moved application development to the cloud.
Challenges of DevSecOps
Even if you treat DevSecOps as another step in your DevOps journey, you can expect
changes to your toolchain, roles on your DevOps and security teams, and how your groups
interact. Over 60% of the respondents to GitLab's 2021 Global DevSecOps Survey report new
• Alerta consolidates and deduplicates alerts from multiple sources to provide quick
visualizations. It integrates with Prometheus, Riemann, Nagios, and other monitoring
tools and services for developers. You can use Alerta to customize alerts to meet your
requirements.
• StackStorm offers event-driven automation providing scripted remediations and
responses. Some users affectionately call it the "IFTTT for ops."
• Grafana allows you to create custom dashboards that aggregate all relevant data to
visualize and query security data.
• OWASP Threat Dragon is a web-based tool that offers system diagramming and a
rules engine for modeling and mitigating threats automatically. Threat Dragon touts an
easy-to-use interface and seamless integration with other software development tools.
DevSecOps brings a culture, much in the same way that DevOps does. Fostering a
DevSecOps culture is about putting security first and making it everybody's job. DevSecOps
organizations need to go beyond the mandatory corporate-wide online security training with
canned dialogue and bring security into development and business processes.
• Begin generating a software bill of materials (SBOM) as a quality gate before OSS
enters your software supply chain.
• Give OSS procurement the same attention as you do the vetting, purchase, and intake
of enterprise software by bringing in talent from your development, security, and
Final thoughts
DevSecOps is a noisy topic right now. Plenty of marketers are trying to put their spin on
defining it to sell more products to commercial and public-sector enterprises. Even so, the
relationship between OSS and DevSecOps remains clean because DevSecOps tools and
strategies offer a security gate to bring OSS into the software supply chain and your
DevSecOps pipeline while maintaining security and compliance from the first step in the
process.
We're at peak Ops in many industries. Rest assured, the definitions of DevOps and
DevSecOps will merge in the months and years to come, if only for the sake of enterprise
sanity and management.
Final thoughts
Before your organization embarks on a DevOps to DevSecOps transformation, take a step
back and define DevSecOps for your teams. Cut through the marketing. Talk about the results
you hope your teams will achieve. Instill a culture of openness and collaboration, and be sure
to listen to the positive and negative vantage points of your development, operations, and
Quality Assurance (QA) teams.
Perhaps your organization is already experimenting with DevOps tools or considering how to
move towards DevOps. Maybe you're still relying on ad hoc processes. Then suddenly your
C-suite or auditors raise the need to standardize on a secure and agile development process.
Enter DevSecOps.
To mitigate the challenges that come with DevSecOps adoption, you'll need to make it a team
effort. Here's what you need to do.
Start small
It's vital to start with a small proof-of-concept project, apply your lessons learned, and then
build upon your successes. Choosing a small project is best done by involving a business
stakeholder open to moving one of their smaller projects to a DevSecOps development
model. Application migration to the cloud is an opportune time to conduct such a proof-of-
concept project.
• An individual contributor and early adopter angling to build more secure applications:
Think of the person to whom the other developers go with their questions.
• A business stakeholder who will benefit either by increasing security or by boosting
sales with the move to DevSecOps: Think about the salesperson or business
developer who can better serve their customers if your company can securely deliver
additional features and versions. A government agency manager (with budget control)
whose division is migrating their legacy applications to the cloud to meet FedRAMP
compliance could be another potential advocate.
DevSecOps is in many ways another level of DevOps maturity for an enterprise. Executive
management and other stakeholders understand the concept of a maturity model, making it a
helpful way to explain the value of this shift. Following a maturity model also helps you tell a
story that includes the people, process, and technology changes that come with a DevOps-to-
DevSecOps transformation.
Here are four typical levels of DevSecOps maturity:
Final thoughts
Only when you track the maturity of your processes, team culture, and tooling do you get the
best current and future-state views of your organization's progress to DevSecOps. The
pandemic pushed many teams to remote work in the past 18 months. As a result, teams had
to mature their processes and mature them quickly to ensure their organization could still
deliver to their customers. DevSecOps brings together the very cultural, collaboration, and
toolchain improvements that development teams require to deliver secure and compliant
software in their new world of work.
DevSecOps is another step in the DevOps journey for your organization. Breaking down your
transformation into phases facilitates working directly with developers and other team
members. A phased approach also allows you to get feedback from those affected by the
change and iterate as necessary.
Here are the first three phases of a DevSecOps transformation:
Continuous feedback
Remote DevSecOps teams have their advantages and disadvantages with continuous
feedback. The manager's role is not simply to deliver feedback on the DevSecOps team's
performance. Instead, the purpose of feedback is to enable teams to collaborate more
effectively. Open source chat tools provide the instant communication necessary for
DevSecOps teams to collaborate in real time.
Container-based architectures
DevSecOps sets the stage for moving to container-based architectures that can be another
cultural change for DevOps teams. A proper and robust implementation of containers changes
developer and operations cultures because it changes how architects design solutions,
programmers create code, and operations teams maintain production applications.
Team autonomy
DevSecOps is no place for micromanagers at any level of your organization. A standard part
of DevSecOps culture is enabling your teams to choose their tools and create processes
based on their work. DevSecOps also promotes distributed decision making that supports
greater agility and innovation.
DevSecOps training
Providing security training to your developers is another step towards making security part of
everyone's job. Training could take the form of in-house developer training in casual formats
• Dispel the notion in your management and stakeholders that you'll be able to automate
every task along with your toolchain. Engage with your stakeholders to learn their
automation priorities and take that feedback into an automation strategy for your
DevOps teams.
• Engage with your development teams — not just the team leads and managers —
about how automation can help them perform their jobs. Listen to their concerns with
empathy and answer their questions with definitive answers.
You can use your existing DevOps center of excellence or DevSecOps center of excellence
as an opportunity to gather input from employees from across your organization about how
automation affects their work. Otherwise, look for formal and informal channels in your
development and operations organizations to gain the input. For example, informal lunch and
learns, group chat channels, or team meetings can be ideal for gathering input depending on
your corporate culture.
Making a major operations transition must be a long-term and well-planned process. Because
DevSecOps is an important step in the DevOps journey for your organization, you are more
likely to find success if you introduce and implement your transformation in phases.
In my previous article, I explained the first three phases of making this change. This article
presents three additional phases of DevSecOps transformation you must work through to
achieve your goals. Finishing these phases requires that you foster team collaboration to
carry your organization through security changes, going live with DevSecOps, and putting the
tools in place for continuous learning and iteration of your DevSecOps toolchain and
processes.
• Providing teams a clean slate to learn a new process from the beginning, not
midstream during a project
• Enabling you to include process and tools training as part of the project kickoff process
• Affording the chance to bring your developers, operations, and security teams together
to discuss mutual expectations for the project
• Giving teams a chance to learn to work together better during the new workflows that
DevSecOps brings to an organization