10
18 QUALYS SECURITY CONFERENCE 2018 How Security Best Practices Enable DevOps Data Transformation - DevSecOps 2019 QSC India Conference Deepak Naik I Vice President | Security Engineering Axis Bank

How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

18QUALYS SECURITY CONFERENCE 2018

How Security Best Practices Enable DevOps Data Transformation - DevSecOps

2019 QSC India Conference

Deepak Naik I Vice President | Security EngineeringAxis Bank

Page 2: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

5.8.2019Qualys Security Conference 20192

What is DevOps?DevOps ensures the collaboration between the teams (development andoperations) by eliminating the common challenges they face while followingother traditional models, say Waterfall Model. DevOps aims at shortening thesystems development life cycle while delivering features, fixes, and updates at afaster pace in close alignment with business objectives.

Page 3: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

What is DevSecOps?It was introduced for integrating security extension with DevOps approach.Hence DevSecOps approach involves creating a ‘Security as Code’ culture withongoing, flexible collaboration between security engineers and security teams.

5.8.2019Qualys Security Conference 20193

Page 4: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

Different DevSecOps Process

5.8.2019Qualys Security Conference 20194

Version Control, Metadata and Orchestration

Integration of Processes

Security Tooling in CI/CD

Compliance

Security Architecture

Incident Management

Page 5: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

Security integration in CI/CD methodologyContinuous Integration (CI), a set of processes defined as a part of a pipelinecalled ‘Build Pipeline’.Continuous Delivery (CD), an extension of Continuous Integration (CI) thatensures new releases are to be delivered in a sustainable way.Organizations can bring security into CI/CD by integrating various security toolsto the existing pipeline.

5.8.2019Qualys Security Conference 20195

Page 6: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

SAST (Static Application Security Testing)SAST process analyzes source code to find security vulnerabilities in theapplication before the code is compiled. SAST can be automated and integratedto the build pipeline in CI/CD phase.

5.8.2019Qualys Security Conference 20196

Page 7: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

DAST (Dynamic Application Security Testing)DAST helps you to identify the vulnerabilities when the application is running and isaccessible to the tester as a normal application user.Grey Box methodology can be used here where the tester has access to applicationwith valid user credentials and test coverage can be ensured for all the pages.

5.8.2019Qualys Security Conference 20197

Page 8: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

Container Security ScanningContainer environment is dynamic and multiple containers spun up and down invarious phases of the software release lifecycle in an automated way. Thelifetime of a container may vary from few seconds to days.

5.8.2019Qualys Security Conference 20198

Page 9: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

Challenges in Container Security

5.8.2019Qualys Security Conference 20199

• Vulnerability Assessment

• Access Controls

• Secure Configuration and Hardenings

• Real-time visibility and control of the container runtime environment

• Auditing and Logging

• Secret Management

Page 10: How Security Best Practices Enable DevOpsData ......How Security Best Practices Enable DevOpsData Transformation -DevSecOps 2019 QSC India Conference Deepak NaikI Vice President |

Thank YouDeepak Naik