Michael Fraser, Contributor – 9:21 am PDT • June 18, 2020
Conduct an online search and you’ll find close to one million websites offering their own definition of DevSecOps.
Why is it that domain experts and practitioners alike continue to iterate on analogous definitions? Likely, it’s because they’re all correct. DevSecOps is a union between culture, practice and tools providing continuous delivery to the end user. It’s an attitude; a commitment to baking security into the engineering process. It’s a practice; one that prioritizes processes that deliver functionality and speed without sacrificing security or test rigor. Finally, it’s a combination of automation tools; correctly pieced together, they increase business agility.
The goal of DevSecOps is to reach a future state where software defines everything. To get to this state, businesses must realize the DevSecOps mindset across every tech team, implement work processes that encourage cross-organizational collaboration, and leverage automation tools, such as for infrastructure, configuration management and security. To make the process repeatable and scalable, businesses must plug their solution into CI/CD pipelines, which remove manual errors, standardize deployments and accelerate product iterations. Completing this process, everything becomes code. I refer to this destination as “IT-as-Code.”
Why is DevSecOps important?
Whichever way you cut it, DevSecOps, as a culture, practice or combination of tools, is of increasing importance. Particularly these days, with more consumers and businesses leaning on digital, enterprises find themselves in the irrefutable position of delivering with speed and scale. Digital transformation that would’ve taken years, or at the very least would’ve undergone a period of premeditation, is now urgent and compressed into a matter of months.
The keys to a successful DevSecOps program
Security and operations are a part of this new shift to IT, not just software delivery: A DevSecOps program succeeds when everyone, from security, to operations, to development, is not only part of the technical team but able to share information for repeatable use. Security, often seen as a blocker, will uphold the “secure by design” principle by automating security code testing and reviews, and educating engineers on secure design best practices. Operations, typically reactive to development, can troubleshoot incongruent merges between engineering and production proactively. However, currently, businesses are only familiar with utilizing automation for software delivery. They don’t know what automation means for security or operations. Figuring out how to apply the same methodology throughout the whole program and therefore the whole business is critical for success.
Automation is king: When a DevSecOps team leverages automation correctly, solutions are repeatable and deployable in a few clicks. For engineers, this frees up coding hours to work on upcoming features, an endless list of bugs, or long-term projects waiting in the pipeline. For security teams, this frees up valuable time needed for threat hunting. For the company, automation results in an efficient and scalable business that can provide continuous value and meet future demand.
Enterprises are slow to adopt DevSecOps (even the DOD is just getting started)
To meet the unlimited demand in the cloud, deployment is required to happen through a secure and automated process. Yet, in a survey presented at Google Next 2019 Partner Summit, researchers stated that 80% of core IT workloads are still on-premise. One reason for this is how a company views the cloud as an opportunity to do more than just a lift-and- shift operation, and instead refactor themselves to be more cloud native. This takes time and company-wide collaboration to plan and execute.
The more crucial issue is the gap in essential talent required to run a competent DevSecOps program. DevSecOps frameworks and tools develop so rapidly that there simply isn’t enough talent that can keep pace with regular and rapid transformation. Lastly, moving to a full-fledged DevSecOps program means deferring to automation. The caveat being that automation comes with a steep learning curve. This includes dedicating time to researching and setting up the right tools, training employees and developing a proactive plan for the risks associated with incorrect misconfiguration.
When we reflect on the obstacles that prevent enterprises from fully moving to DevSecOps, it’s easy to sympathize with their state of immobility. How can they overcome these considerable obstacles simultaneously?
Immediately actionable tips to jump-start migration to the DevSecOps methodology
Start small. Do not overcomplicate the process by automating too many tools or solutions at once. Start with a small portion of your development process and iterate until it runs smoothly. Choose an existing area that you need to repeat often and focus on automating this area first.
Look for a CI/CD platform that supports the tools you need to utilize as well as facilitates collaboration between security, operations and development teams. Implemented correctly, CI/CD helps you reach peak productivity with a few clicks.
Pick your tools carefully. When picking tools, look for best-in-class tools in each category, such as Terraform for Infrastructure-as-Code, Ansible for Configuration-as-Code or OpenSCAP for Security-as-Code. These tools typically come with substantial community support, so you can always troubleshoot quickly. Starting with open-source tools is a good option. However you should select platforms that can quickly roll back mistakes without interrupting your delivery.
Insist on visibility. Work with tools that offer version control, such as Github or Gitlab. Visibility leads to more cross team collaboration, and version control ensures high availability to code and swift disaster recovery.
Be patient with security automation. Often, this is the most difficult piece to automate as many tools provide alerts but stop at providing automation. Lean on your cybersecurity vendor or internal team by inviting them to assist you with shifting left. Furthermore, as you evaluate your security audits, identify a recurring pain point and automate from there to achieve the biggest gains immediately.
Avoid these common mistakes