{"id":2241,"date":"2018-08-07T07:51:28","date_gmt":"2018-08-07T07:51:28","guid":{"rendered":"https:\/\/lcloud.pl\/?p=2241"},"modified":"2024-12-12T11:50:33","modified_gmt":"2024-12-12T10:50:33","slug":"devsecops-as-a-security-guard","status":"publish","type":"post","link":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/","title":{"rendered":"DevSecOps as a security guard"},"content":{"rendered":"<h5 style=\"text-align: justify;\"><span style=\"font-size: 22px; color: #199ad8;\">There are many approaches to managing IT projects. One of them is DevOps, also used in working with the AWS cloud. DevOps is, in short, a technique combining the development and exploitation of resources, which aims to provide the highest quality of cooperation between IT maintenance specialists and software development specialists. This methodology is based on the iterative work model, which is based on repeatability (iteration) and the fastest possible delivery of the solution (code) in the shortest possible time. The term DevOps was first used in 2009 by Patrick Debois during DevOpsDays in Ghent.<\/span><\/h5>\n<p style=\"text-align: justify;\"><strong><span style=\"font-size: 18px;\">So what the DevSecOps is? <\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\">The safety element is now included in the already known DevOps methodology. Already at the stage of creating an IT solution, a security engineer is additionally included in the operation. A person or department dealing with security who, in consultation with developers and the IT maintenance department, consults the code that they co-create and implement. This allows you to eliminate gaps in the code, which are an easy morsel for hackers. To better illustrate the operation of the mechanism, the following diagram shows how important it is to integrate the DevOps approach with the appropriate level of security.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2229\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/wykres.png\" alt=\"\" width=\"744\" height=\"289\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/wykres.png 744w, https:\/\/lcloud.pl\/wp-content\/uploads\/wykres-300x117.png 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/wykres-252x98.png 252w, https:\/\/lcloud.pl\/wp-content\/uploads\/wykres-161x63.png 161w, https:\/\/lcloud.pl\/wp-content\/uploads\/wykres-140x54.png 140w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 10px;\">Source: &#8220;DevSecOps: How to Seamlessly Integrate Security Into DevOps&#8221;, Gartner, 2016<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\">During the implementation of individual activities such as: planning, creation or implementation; the factor connecting the work of both departments is knowledge of secure coding (secure software engineering).<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\">DevOps is undeniably a methodology that has improved the work on implementing and adapting solutions. First of all, including large companies, where tens or hundreds of deployments are carried out in a short time. On the other hand, adding a security layer in DevSecOps allows for faster verification of created codes and repairing or complete elimination of created errors \/ security gaps.<\/span><\/p>\n<h6 style=\"text-align: justify;\"><span style=\"font-size: 18px; color: #199ad8;\">The DevSecOps methodology clearly puts emphasis on the security layer. That is why it has found its application in the financial and telecommunications industries, as well as in the development of advanced applications. During the preparation of the solution, protection and security should focus, for example, on permission control or protection against malware. Threat awareness allows for more effective work of programmers and problem-free maintenance of the solution.<\/span><\/h6>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\">In the further part of the article there are a few tips that will help in the application of the DevSecOps methodology.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\"><strong>As part of automation, the DevOps methodology helps in deploying applications<\/strong>, scaling resources, ensuring high availability of applications and the environment, creating backup copies and implementing changes in security mechanisms. <strong>The first step should be to define the goal to be achieved.<\/strong> Then, you should indicate the security checkpoints that are necessary to maintain its highest level. As a result, a targeted variant of the use of automation can be created.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\"><strong>Another activity is to understand the possibility of using codes under an open source licence.<\/strong> Solutions based on the cloud and DevOps methodologies allow for more efficient creation of new applications using ready-made code fragments. When using the source code used to create a new application, the question becomes whether it does not create a contextual gap. Thanks to the services prepared by AWS, you can solve these problems in an easy and effective way. In this case, the Amazon Inspector service will apply, which automatically evaluates applications for weak points or deviations.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\"><strong>Important in the DevSecOps methodology is the selection of appropriate SAST (Source Application Security Testing) tools.<\/strong> At the beginning, it is worth considering the inclusion of capture rules such as errors in SQL. At the moment when people working with the code see how the tool will allow them to catch security gaps during work &#8211; they will be more willing to use it.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\"><strong>Hazard modeling and risk assessment are also important.<\/strong> They are not the simplest activities. That is why it is worth paying attention to them before we start using the DevSecOps methodology. Each risk assessment method includes common elements. These include: identifying threats, assessing the probability of potential threats and losses they may bring. Thanks to practice connected with risk assessment and models of threats, people involved in security can get a better idea of, among others, about attacks and their types, confidential data and their control mechanisms etc.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px; color: #199ad8;\">More tips on good practices on the use of the DevSecOps methodology can be found in the presentation available on SlideShare.<\/span><\/p>\n<p><iframe loading=\"lazy\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" data-cookieconsent=\"statistics, marketing\" data-src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/hEEJ1NHDig4BQu\" width=\"595\" height=\"485\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><div class=\"cookieconsent-optout-statistics cookieconsent-optout-marketing\"><\/div><\/p>\n<p><strong style=\"font-size: 10px;\"><a title=\"DevSecOps Best Practices\" href=\"\/\/www.slideshare.net\/LCloud\/devsecops-best-practices\" target=\"_blank\" rel=\"noopener\">DevSecOps Best Practices<\/a> <\/strong><span style=\"font-size: 10px;\"> from <\/span><strong style=\"font-size: 10px;\"><a href=\"https:\/\/www.slideshare.net\/LCloud\" target=\"_blank\" rel=\"noopener\">LCloud<\/a><\/strong><\/p>\n<div><span style=\"font-size: 18px; color: #199ad8;\">The benefits of taking up the project with the DevSecOps methodology include:<\/span><\/div>\n<div>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-size: 18px;\">effectiveness of threat detection<\/span><\/li>\n<li><span style=\"font-size: 18px;\">high security<\/span><\/li>\n<li><span style=\"font-size: 18px;\">cost reduction<\/span><\/li>\n<li><span style=\"font-size: 18px;\">the speed of the solution provided<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 18px;\">All the above-mentioned advantages have an impact on the company&#8217;s reputation and improvement of the existing business model. An important factor in the practical application of the methodology based on agile solutions is the fact in which it is worth analyzing inputs and their estimation during projects. Estimation is not a precise tool, but only an approximate measure of the workload devoted to the solution being prepared. The justification is in the fundamentals of the Agile methodology, which is based on empirical process control. It involves frequent inspection and adaptation of activities. These procedures carried out on an ongoing basis allow for the location and correcting of wrong decisions, elimination of obstacles and inaccuracies resulting from the fact that there is a variable and unpredictable reality in which the software \/ application development process takes place.<\/span><\/p>\n<h6 style=\"text-align: justify;\"><span style=\"color: #199ad8;\"><strong><span style=\"font-size: 18px;\">When undertaking a project, it is worth considering using the DevSecOps methodology. It gives not only the possibility of a safe process of creating new solutions, but also allows for a more effective and faster implementation.<\/span><\/strong><\/span><\/h6>\n<\/div>\n<p>If you have questions related to DevSecOps or you are interested in the issue of security, <a href=\"mailto:kontakt@lcloud.pl\">contact us<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many approaches to managing IT projects. One of them is DevOps, also used in working with the AWS cloud. DevOps is, in short, a technique combining the development and exploitation of resources, which aims to provide the highest quality of cooperation between IT maintenance specialists and software development specialists. This methodology is based [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10142,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[147,37,35,41,34],"class_list":["post-2241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-chmura-obliczeniowa-en","tag-cloud","tag-cloud-computing","tag-devsecops","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DevSecOps as a security guard | LCloud<\/title>\n<meta name=\"description\" content=\"DevSecOps is an increasingly used methodology for running innovative projects in IT. What is it and what is its task? What are the Best Practices during its implementation? You will learn all this from our entry.\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps as a security guard | LCloud\" \/>\n<meta property=\"og:description\" content=\"DevSecOps is an increasingly used methodology for running innovative projects in IT. What is it and what is its task? What are the Best Practices during its implementation? You will learn all this from our entry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/\" \/>\n<meta property=\"og:site_name\" content=\"LCloud\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-07T07:51:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-12T10:50:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"274\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"LCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"LCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/\",\"url\":\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/\",\"name\":\"DevSecOps as a security guard | LCloud\",\"isPartOf\":{\"@id\":\"https:\/\/lcloud.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg\",\"datePublished\":\"2018-08-07T07:51:28+00:00\",\"dateModified\":\"2024-12-12T10:50:33+00:00\",\"author\":{\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a\"},\"description\":\"DevSecOps is an increasingly used methodology for running innovative projects in IT. What is it and what is its task? What are the Best Practices during its implementation? You will learn all this from our entry.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/#primaryimage\",\"url\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg\",\"contentUrl\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg\",\"width\":1440,\"height\":274,\"caption\":\"DevSecOps stra\u017cnikiem bezpiecze\u0144stwa\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lcloud.pl\/#website\",\"url\":\"https:\/\/lcloud.pl\/\",\"name\":\"LCloud\",\"description\":\"AWS Advanced Consulting Partner | APN Well-Architected Partner\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lcloud.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a\",\"name\":\"LCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g\",\"caption\":\"LCloud\"},\"url\":\"https:\/\/lcloud.pl\/en\/author\/wpdev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DevSecOps as a security guard | LCloud","description":"DevSecOps is an increasingly used methodology for running innovative projects in IT. What is it and what is its task? What are the Best Practices during its implementation? You will learn all this from our entry.","og_locale":"en_US","og_type":"article","og_title":"DevSecOps as a security guard | LCloud","og_description":"DevSecOps is an increasingly used methodology for running innovative projects in IT. What is it and what is its task? What are the Best Practices during its implementation? You will learn all this from our entry.","og_url":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/","og_site_name":"LCloud","article_published_time":"2018-08-07T07:51:28+00:00","article_modified_time":"2024-12-12T10:50:33+00:00","og_image":[{"width":1440,"height":274,"url":"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg","type":"image\/jpeg"}],"author":"LCloud","twitter_card":"summary_large_image","twitter_misc":{"Written by":"LCloud","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/","url":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/","name":"DevSecOps as a security guard | LCloud","isPartOf":{"@id":"https:\/\/lcloud.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/#primaryimage"},"image":{"@id":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/#primaryimage"},"thumbnailUrl":"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg","datePublished":"2018-08-07T07:51:28+00:00","dateModified":"2024-12-12T10:50:33+00:00","author":{"@id":"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a"},"description":"DevSecOps is an increasingly used methodology for running innovative projects in IT. What is it and what is its task? What are the Best Practices during its implementation? You will learn all this from our entry.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/#primaryimage","url":"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg","contentUrl":"https:\/\/lcloud.pl\/wp-content\/uploads\/DevSecOps-straznikiem-bezpieczenstwa-AWS.jpg","width":1440,"height":274,"caption":"DevSecOps stra\u017cnikiem bezpiecze\u0144stwa"},{"@type":"WebSite","@id":"https:\/\/lcloud.pl\/#website","url":"https:\/\/lcloud.pl\/","name":"LCloud","description":"AWS Advanced Consulting Partner | APN Well-Architected Partner","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lcloud.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a","name":"LCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lcloud.pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g","caption":"LCloud"},"url":"https:\/\/lcloud.pl\/en\/author\/wpdev\/"}]}},"_links":{"self":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/2241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/comments?post=2241"}],"version-history":[{"count":27,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/2241\/revisions"}],"predecessor-version":[{"id":10149,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/2241\/revisions\/10149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/media\/10142"}],"wp:attachment":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/media?parent=2241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/categories?post=2241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/tags?post=2241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}