By their nature, DevOps and software-as-a-service (SaaS) are circular processes of planning, developing and operating. This process allows us to continually improve our security posture by leveraging the capabilities of our security assets along with the knowledge of our security professionals.

Therefore, it’s important to build security thinking into each of our development phases.

Planning Stage

Threat modeling and risk assessment should occur early in the life cycle. Threat modeling requires engineers to understand what assets they have, how they interact and how they are managed. This allows you to identify, rate and remediate during development. Common questions that must be addressed during this stage include:

  • What data are we collecting?
  • How will we protect the data against internal and external attack?
  • What is the security posture of the environment in which we add our new features?
  • What have we learned from our previous deployment?
  • What are some of the security challenges encountered?

Development Stage

The second stage, development, focuses on the best implementation practices for secure engineering. You’ll have to:

  • Implement the encryption and protection models selected in planning.
  • Integrate automated security scans into development processes and share the results.
  • Engage ethical hacking groups to complete penetration testing.
  • Consider how hackers could use exposed APIs and logging information in the new tools adopted for continuous delivery.
  • Educate technical teams to consider security risk in all aspects of development, including APIs, data protection and more.

Operations Stage

In the third stage, professionals emphasize security monitoring and incident response. You now own the network and the machines in which the new feature works, so it’s essential to guarantee everything is secure. This requires a lot of effort on your part since you must:

  • Review the new data gathered to ensure it is protected in line with controls.
  • Consider how the new features impact your security posture, including what internal and external sources now have access.
  • Verify that the growing inventory of machines are hardened to the latest patch levels and remediated against known vulnerabilities.
  • Understand who has access to what systems and regularly review business needs to adjust this access accordingly.
  • Certify that privileged or high-risk activities are managed at a privileged level.
  • Ensure the workstations operators use are secure.
  • Invest in building capabilities that give a real-time view into system compliance.
  • Feed back vulnerability information to the next product cycle.
  • Conduct regular security scans of your network for vulnerabilities and share the results.
  • Employ constant review of the logging and monitoring of security events.
  • Be open to review the processes in an agile manner as the business needs change.
  • Apply a practical approach to incident management. Important items to consider include establishing segregation of duties, understanding the environment, having runbooks and identifying key log files for root cause analysis. It’s also important to share any incidents with all stakeholders.
  • Be transparent about threats encountered and celebrate those that are successfully defended against.

By continuously securing the new feature, you can identify vulnerabilities early and manage the risk. The effort required to apply security after the fact grows exponentially in a continuous delivery model where code and machines change constantly. By having a robust, secure infrastructure in place, you can help protect the brand.

DevOps Evolves to Meet Security Needs

DevOps and SaaS allow the development community access to what clients are using software for like never before. But now that the data center has moved, security is all our responsibility.

Security posture and DevOps should not be at odds; the success of the company is the end goal for both. In fact, DevOps should enable us to increase our security posture through quick reaction times — and success will be dependent on it.

By embracing automation, building on known secure infrastructure and building in security compliance, developers can continue to deliver as the business needs. DevOps gives us an opportunity to be proactive about security.

This is a maturity curve. We as brands are at various levels, and we need to understand where we are to build a plan that increases our security maturity level. We must invest in the best-of-breed solutions for our services by leveraging and improving our own security assets in this new space.

More from Cloud Security

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Why Are Cloud Misconfigurations Still a Major Issue?

Cloud misconfigurations are by far the biggest threat to cloud security, according to the National Security Agency (NSA). The 2022 IBM Security X-Force Cloud Threat Landscape Report found that cloud vulnerabilities have grown a whopping 28% since last year, with a 200% increase in cloud accounts offered on the dark web in the same timeframe. With vulnerabilities on the rise, the catastrophic impact of cloud breaches has made it clear that proper cloud security is of the utmost importance. And…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…

How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a nice feature because it allows developers and administrators to manage GCP resources without having to install or keep any software locally on their system. From…