The DevSecOps Pipeline [5 Security Stages & the Infinity Loop]

5 Safety Levels In-Depth

A typical DevOps pipeline incorporates eight levels. The DevSecOps pipeline retains all of those and provides 5 extra which are particular to safety:

1. Risk Modeling

Risk modeling in DevSecOps makes an attempt to find out the dangers related to a software program asset and the almost certainly methods an attacker would possibly attempt to compromise it. This course of, which is usually supported by safety groups, features a vary of actions:

  • Analyzing the surroundings the appliance operates inside
  • Figuring out doable assault targets (e.g., delicate buyer knowledge)
  • Outlining doable assault eventualities (e.g., OWASP Top 10 threats or abuses of legit logic)
  • Predicting the almost certainly sources of vulnerabilities

These steps assist a corporation decide how a lot threat a brand new or up to date software program asset might generate—and, most crucially, assist growth groups proactively establish mitigation choices for the almost certainly safety points and dangers.

Persistently together with risk modeling within the DevSecOps pipeline additionally helps growth groups perceive how safety and growth intersect and can assist cut back threat for the group.

2. Safety Testing

Safety testing is the primary operational stage within the DevSecOps pipeline. Automated safety scanners play an important function right here and are sometimes the primary (and easiest) safety management built-in growth workflows. Static, Dynamic, and Interactive Utility Safety Testing (SAST/DAST/IAST) scanners are a superb method to uncover easy vulnerabilities in code earlier than it’s pushed to manufacturing.

Nevertheless, scanners usually are not the one safety testing apply included in a DevSecOps pipeline. Others embrace:

  • Handbook and automatic code evaluations—these processes are important to uncover bugs, inefficiencies, and different points in newly-written code that automated safety scanners can’t discover.
  • Safety assessments and pentests—whereas not quick sufficient to include into each cycle, safety testing by expert hackers is the primary alternative to show a software program asset to real-world threats.

3. Evaluation and Prioritization

Sometimes, the safety testing stage of a DevSecOps pipeline uncovers loads of potential points and vulnerabilities, notably for brand new or considerably modified software program belongings. Nevertheless, most organizations don’t wish to look forward to builders to resolve all these points earlier than pushing code to manufacturing—that might gradual the pipeline down an excessive amount of and doubtlessly disrupt enterprise aims.

As a substitute, the DevSecOps pipeline consists of the evaluation and prioritization section to assist growth groups establish and resolve probably the most important dangers. Improvement groups evaluate all the potential threats and vulnerabilities uncovered in the course of the safety testing stage, combination them right into a grasp checklist, and prioritize them based mostly on their potential enterprise influence and the probability of exploitation—in different phrases, by the threat they pose to the group.

The safety staff sometimes helps this stage, because it requires a robust understanding of the group’s risk panorama, compliance obligations, and the results of a profitable assault.

4. Remediation

After prioritizing all excellent vulnerabilities and points, the subsequent step is for the event staff to remediate them. The safety staff could proceed to assist this course of by educating builders on the character of various threats and doable remediation choices. Alternatively, a growth staff could take full possession of this course of over time.

Sometimes, builders can push the code to manufacturing after remediation of particular vulnerabilities —or after the discount of general threat related to an asset is at a suitable stage.  Improvement groups can then tackle recognized vulnerabilities in future code releases in order that general threat continues to say no over time.

5. Monitoring

Monitoring is a post-push stage of the DevSecOps pipeline the place growth groups observe the general safety posture of a software program asset because it runs in manufacturing. This stage is important to uncover new vulnerabilities or misconfigurations that may happen over time and even spot weaknesses that had been at all times current however missed by pre-push safety practices.

The monitoring stage can embrace numerous safety practices, resembling:

  • Common completion of safety assessments and pentests to see how a manufacturing software program asset holds up towards real-world threats.
  • Utilizing bug bounty and Vulnerability Disclosure Packages (VDPs) to offer a steady supply of vulnerabilities, misconfigurations, enterprise logic abuses, and different points {that a} malicious actor might exploit.

Even with “perfect” DevSecOps processes, it’s inconceivable to uncover all points and dangers related to a software program asset earlier than it reaches manufacturing. Speedy change means the possible introduction of recent points over time or new and unpredictable threats. The monitoring stage helps growth groups observe and cut back a software program belongings threat profile over time, making certain it stays resilient to assaults whereas fulfilling its enterprise function.

DevSecOps is an Ethos, Not a Prescription

It’s necessary to know that whereas the DevSecOps pipeline diagram above seems easy, every group’s implementation of DevSecOps is completely different. Not all safety practices might be included earlier than each code push—notably for growth groups with fast cycles. For instance, a staff that pushes code twice every day can’t count on to finish a guide code evaluate earlier than each push.

As a substitute, every group ought to experiment earlier than selecting a DevSecOps pipeline that balances the necessity for safety towards operational issues resembling pace, assets, and threat administration.

Enhance DevSecOps with HackerOne

HackerOne offers entry to the world’s largest group of moral hackers, who possess a whole vary of testing expertise and experience to assist growth groups discover and resolve vulnerabilities in software program belongings. These embrace:

  • Risk modeling assist through HackerOne Insights
  • Automated and guide code reviews-as-a-service
  • Safety assessments and pentests accomplished by hackers with domain-specific experience
  • Steady testing through bug bounty or VDP
  • Efficiently resolved validation that points through HackerOne Retest

We design our companies to assist the trendy DevSecOps pipeline. HackerOne’s Attack Resistance Management Platform helps growth groups safe their pipelines and shut the assault resistance hole, so many organizations face at present—the distinction between belongings you recognize and may defend and the unknown and unprotected—by constantly enhancing visibility and remediation throughout your evolving assault floor. We aid you obtain assault resistance. Contact us to be taught extra.

Author: HackerOne
Date: 2022-06-28 14:59:00

Source link



Related articles

Alina A, Toronto
Alina A, Toronto
Alina A, an UofT graduate & Google Certified Cyber Security analyst, currently based in Toronto, Canada. She is passionate for Research and to write about Cyber-security related issues, trends and concerns in an emerging digital world.


Please enter your comment!
Please enter your name here