{"id":111086,"date":"2020-05-11T06:00:19","date_gmt":"2020-05-11T13:00:19","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=111086"},"modified":"2020-05-07T12:43:57","modified_gmt":"2020-05-07T19:43:57","slug":"cloud-devsecops","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/05\/cloud-devsecops\/","title":{"rendered":"Bridging the DevOps and Security Divide with DevSecOps"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">To keep up with the demands of working in the cloud \u2013 and do so securely \u2013 we need to incorporate security practices into the application development and deployment pipelines. The term \u201cDevSecOps\u201d describes this process. Unfortunately, the transformation to DevSecOps can lead to friction between Security and DevOps teams. The good news is that it doesn\u2019t have to be this way. Enterprises can adopt practices that reduce conflict and help make the journey to DevSecOps successful. Purpose-built security tools can also empower DevOps teams to make this transition.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Importantly, the information and conclusions presented here are based on conversations I have had with DevOps, Security and DevSecOps leaders from the finance, retail and media industries. Those experiences have given me insight into the concerns these teams tend to have, as well as information and ideas about how they can be addressed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Emergence of DevSecOps<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Innovative products and services catering to end-user needs and preferences require applications to be deployed with great agility, frequency and scale. Consequently, development teams leverage cloud and container platforms in conjunction with a DevOps practice to meet business objectives.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security teams, tasked with protecting customer data and apps, have a hard task under normal circumstances. The adoption of highly elastic and scalable infrastructure \u2013 frequently deploying resources from hundreds to a thousand times a day \u2013 puts a tremendous burden on security teams that are ultimately unable to meet these requirements.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DevSecOps, when done right, has the ability to inject security in a cloud native manner to provide vulnerability management, help with compliance, and offer misconfiguration and runtime protections. However, security and DevOps teams have often been at odds with each other in their efforts to achieve their respective objectives.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Both DevOps and Security teams can obtain a better understanding of the reasons that contribute to prior failed attempts at DevSecOps. Implementing certain steps can also enable a successful transition.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Marching Toward Different Goals\u00a0<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The term \u201cculture\u201d is often used to describe people, process and tools that enable organizations to accomplish business objectives. However, it has been hard for many organizations to embrace and acknowledge the cultural barrier that exists between security and DevOps teams. It is important to understand these differences before discussing their consequences. Some major differences are:\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td>\n<h3><b>DevOps Culture\u00a0<\/b><\/h3>\n<\/td>\n<td>\n<h3><b>Security Culture<\/b><\/h3>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Security inhibits innovation and agility.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Does not trust DevOps to get security right.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Security is hard to adopt.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Needs to ensure compliance and protection.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Security is not a DevOps function.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Do as I say in order to sanction your application.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">This mismatch precipitates undesirable outcomes for the enterprise as a whole:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Apps with critical vulnerabilities are deployed into production.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">No visibility into the compliance posture (apps, cloud and container platform).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Applications fully exposed to the internet.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">No record of highly ephemeral workloads.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Inability to correlate app behavior \u2013 sanctioned or unsanctioned.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><strong>Toward a Common Goal<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">There is no silver bullet or switch that can be flipped to adopt a DevSecOps practice. The <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/03\/cloud-break-silos-devsecops\/\">transformation to DevSecOps<\/a> is a process of continuous improvement, not an end in itself. Improved communication, collaboration and, most importantly, empowerment can help bridge the cultural divide.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>Communication | Process<\/h4>\n<p><span style=\"font-weight: 400;\">Good communication helps to put in place a process that enables security teams to clearly articulate the desired outcomes, such as full visibility into vulnerabilities, compliance failures and misconfigurations prior to applications being deployed into production. Conversely, it will help DevOps teams to recognize that it's far \u201ccheaper\u201d (in terms of breach and reputation) and efficient to address these issues in the CI\/CD pipeline as opposed to on a running production environment. Establishing consensus and enabling a continuous process of improvement dramatically reduces the attack surface.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>Collaboration | People<\/h4>\n<p><span style=\"font-weight: 400;\">Better collaboration among people allows both teams to partner to converge on a strategy to minimize the attack surface. For example, security teams desire that cloud misconfigurations and critical vulnerabilities be detected and addressed when a pull request (PR) is made. DevOps teams are willing to sign up for this requirement, as it is much easier to address these issues while a feature is being developed, aided by instant feedback (with data provided as a pre-check failure in the PR), as opposed to being bolted on after deployment (far more complex to accomplish).\u00a0\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4>Empowerment | Tools<\/h4>\n<p><span style=\"font-weight: 400;\">Empowerment through tools ensures that security teams provide DevOps teams with the right tools to take ownership for the security posture of their applications. Providing security tools for DevOps dramatically increases the willingness and ability of DevOps teams to inject security into their pipelines. For example, security needs to provide tools to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Scan infrastructure misconfigurations when a PR is made.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Scan container images when the image is built or after it is checked into a registry.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Decentralize security, by enabling DevOps teams to specify, consume and tweak security policies for their respective teams and pipelines.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Taking these steps is a recipe for success in the transformation to DevSecOps, wherein:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security teams <\/span><b>trust<\/b><span style=\"font-weight: 400;\"> DevOps teams to take ownership for security.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security <\/span><b>empowers<\/b><span style=\"font-weight: 400;\"> DevOps with the right tools to adopt DevSecOps.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Culture change happens <\/span><b>organically<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security <\/span><b>partners<\/b><span style=\"font-weight: 400;\"> with DevOps to adopt DevSecOps.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security adopts a <\/span><b>trust, but verify<\/b><span style=\"font-weight: 400;\"> posture.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A <\/span><b>process of continuous improvement<\/b><span style=\"font-weight: 400;\"> strengthens the security posture.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To learn more about bridging the divide between security and DevOps teams, you can watch our <\/span><a href=\"https:\/\/www.crowdcast.io\/e\/containerolympics\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cloud Native Live virtual summit on-demand<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adopting DevSecOps means recognizing gaps between DevOps and security teams, and accepting that DevSecOps is a practice, not an endpoint.<\/p>\n","protected":false},"author":663,"featured_media":111087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719,6768],"tags":[7030],"coauthors":[6902],"class_list":["post-111086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","category-secure-the-cloud","tag-devsecops"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/VV-4.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=111086"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111086\/revisions"}],"predecessor-version":[{"id":111104,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111086\/revisions\/111104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/111087"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=111086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=111086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=111086"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=111086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}