The First Steps on a CISOs DevOps Journey

CISOs DevOps

The marriage between DevOps and Security is rapidly gaining traction. Security is shifting from its former mindset of being its own silo to getting on the same agenda as their developer counterparts. For CISOs the opportunity to get security baked in has never been as achievable, but they need to focus on building that synergistic foundation between DevOps and Security. Following are some Golden Rules for CISOs looking to make the most of the agility DevOps brings:

The first step is developing a mutual understanding. To get on the same page as your development team figure out:

  • What their business goals are
  • How they are going to meet their goals with their devops pipeline
  • What tools they are using
  • What kind of efficiencies they are looking to achieve

Then align security to support DevOps in each of those areas.

Conversely, ensuring that DevOps understands Security’s goals and is actively looking to ensure compliance to the organization’s security policies. The DevOps paradigm is a key opportunity to get compliance policies built in earlier into the software development cycle through closer collaboration with developers.

  1. Build trust and credibility: Related to the first step, after you understand your developers’ end game, do what you tell them you are going to do, and understand and empathize with their struggles. This makes it much easier to create a climate of mutual understanding and trust.
  2. Embed security into the overall developer chain: It not only speeds up the development process, it makes it more secure. However, DevOps needs a compelling case to put in the required effort and Security has to come to the table as a collaborator versus with a list of demands. For example,
    1. Ensure that access to GitHub repositories is not broader than required and that developers are careful with login credentials per this being a noted breach vector
    2. Automate and where not possible conduct manual system and network security assessments are built into the software development lifecycle
    3. Work with developers to ensure the passwords are compliant, that they are being rotated
    4. Apply encryption at rest, in use and in transit
  1. Get involved in open source. Increasingly developers and companies are relying on open source software. However, there’s no standard way of documenting security in open source projects so it becomes important to build security into the development process and check and re-check applications for Vulnerabilities. The upside for CISOs is that through utilizing open source software they get the opportunity for many eyes to look over their software and therefore, bugs and vulnerabilities get discovered faster.
  2. Treat security as an ever-changing practice that one has to stay on top off and alter practices as the landscape changes. Organizations that offer developers and security teams the opportunity to cross-train will find that they develop security-conscious developers and security teams that are business focused. This is an opportunity for security teams to come up to speed with developer tool such as Chef and Puppet while developers get to learn about vulnerability management and other security tools and practices.

By Evelyn De Souza

Kelly Dyer
Achieving Data Security Compliance As individuals, we go through life sharing information about ourselves in every aspect of our daily existence. From credit checks for securing a loan, through to entire personal and family medical ...
James Corbishly
Teams Sprawl in the Remote Workspace As working from home has become the new everyday norm, with more employers embracing the remote-work model as a new and likely permanent fixture of the employment world, there ...
Jonathan Custance
IoT –  Part of Your Essential Kit Jonathan Custance, Co-Founder of Green Custard outlines how industrial organisations can leverage IoT to dramatically reduce their carbon footprint  Technological progress and environmental sustainability have always been at ...
Jen
VoIP and PBX Phone Systems The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both ...
Ray Meiring
Proposal Management Software Benefits Amid the COVID-19 pandemic-induced supply chain and market challenges, 2021 started to course correct, allowing many companies to resume business operations. As a result, request for proposals (RFPs), sales proposals, and ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.