Sie sind auf Seite 1von 4

11/23/2018 DevSecOps Is an Abomination!

- DZone DevOps

DevSecOps Is an Abomination!
Get a take on why security is not more integrated into DevOps processes, and how the right toolset - and a better
understanding - can help it seem like less of a monster.
by John Walsh  · Feb. 28, 18 · DevOps Zone · Opinion

Discover how you can reduce your Kubernetes installation from 22 steps to 1.

Dr. Frankenstein's monster is one of the most hated and misunderstood monsters of all time. Frankenstein brought his creation into the world without
proper forethought or planning. He simply stitched various body parts together to form an uncontrollable abomination. There are similarities here with
how DevSecOps is typically created. Frankenstein wannabes simply bolt security on to DevOps or stitch security policies from different tools together. The
result is an uncontrollable DevSecOps abomination. DevSecOps abominations wreak havoc on operations and development teams daily. The problem is not
DevSecOps, it is that people do not understand it or implement it correctly.

The DevOps Privileged Access Problem

At the heart of DevOps is the ability to express infrastructure as code. This allows operations teams to con igure infrastructure needs with code, including
privileged access through secrets. This complicated web of machine-to-machine access makes it dif icult for organizations to tell who or what can access
their secrets. These secrets are often hardcoded in clear text or publicly accessible. Attackers know this and are exploiting vulnerable secrets on GitHub and
scanning for exposed SSH keys across the internet.

DevOps, Security Sold Separately

Many people use the terms DevSecOps and DevOps interchangeably because they feel security is already part of the DevOps process. A recent CyberArk
DevOps Survey asked respondents if DevOps and security teams were integrated and less than half said yes. Almost three quarters of respondents said they
had no privileged account security strategy for DevOps. Almost all respondents (99%) failed to identify all of the different places privileged accounts or 1/4
11/23/2018 DevSecOps Is an Abomination! - DZone DevOps
p g y gy p p ( ) y p p g
secrets could exist in a DevOps environment. These are common and well-established security practices, but they have not been adopted en masse by
DevOps teams. Clearly, DevOps and DevSecOps are not synonymous. DevOps teams need to work harder at becoming true DevSecOps teams.

Why Security Is Not More Integrated

According to leading industry analysts, DevOps compliance and security are top concerns for IT leaders, but security is generally seen as an inhibitor to
DevOps agility. Security gets a bad reputation because many security tools have lagged behind the times and actually predate DevOps practices; some
security tools might actually predate the DevOps engineers themselves! DevOps allows companies to be more responsive to customer and market needs,
and enable highly productive teams to do more with less. The last thing any company wants to do is disrupt this low.

Bolt on Security Is Costly

Agile has taught us the later a change is made in the development process, the more it costs to make. The same is true for security changes. For example, it is
far costlier to change all your hardcoded secrets after a hack than it is to build security solutions into your process that don't require hardcoded secrets.
Security needs to be involved from the beginning of the development process, not bolted on at the end. It is time for security to shift left and be a part of the
process from the start, but developers should not be responsible for implementing and enforcing security policy. The solution is to maintain Separation of
Duties by empowering dedicated security teams to do their jobs.

Stitching Security Policies Together Doesn't Work

A recent DevOps community poll asked members what their top three DevSecOps tools were. Everyone picked tools like Jenkins, Puppet, Chef, Docker,
Kubernetes, GitHub, and so on. Where is the Sec in DevSecOps on this list? Most of these tools have some form of security policy, but it ranges from
vulnerability patching to managing access related to the tool. In some cases, if you compromise one secret, you gain access to everything that tool can
access. Stitching security policy together from a diverse set of tools means that the security team needs to understand the interface and intricacies of each
tool. The result is an unmanageable security policy abomination.

Like Frankenstein's Monster, DevSecOps Is Misunderstood

DevOps security needs an owner and that person needs to be involved in the development process from the beginning. Security policy should not disrupt
the low or velocity of DevOps teams. However, security needs to have visibility into what kind of access machines and people have. Implementing least
privilege policies and machine identities will help DevSecOps teams control access and privilege. Many DevOps tools have some form of security policy, but
this is not what they specialize in and it is dif icult to implement and control consistent security policy across a diverse toolset. Conjur Open Source helps
DevSecOps teams secure secrets and control machine access. 2/4
11/23/2018 DevSecOps Is an Abomination! - DZone DevOps

True DevSecOps is achieved by:

Having a dedicated security expert manage DevOps security policy

Shifting security left in the development process
Implementing least privileged security policy
Taking hard-coded secrets out of code
Controlling machine access through machine identity
Controlling privileged access through one consolidated security policy
Not letting operations or development teams create or enforce security policy

Download the Kubernetes cheatsheet to learn more about how easy it is to run Kubernetes on any infrastructure with Mesosphere DC/OS

Like This Article? Read More From DZone

DevSecOps Is a Key to Cost Reduction SSDLC 101: What Is the Secure Software
Development Life Cycle?

Learning From Data Breaches: Integrating Security Free DZone Refcard

in DevOps Continuous Delivery

11/23/2018 DevSecOps Is an Abomination! - DZone DevOps

Published at DZone with permission of John Walsh , DZone MVB. See the original article here. 
Opinions expressed by DZone contributors are their own.

DevOps Partner Resources

ecure Mobile Development Best Practices

ubernetes Cheat Sheet

ant to build security into your mobile apps? Get this checklist of items to consider.

est Practices in Test Automation (eBook)
anorex 4/4