The marketplace is demanding agility, but many enterprises perceive the need for agility as an ongoing security risk. If applications are constantly evolving, they assume, the process will constantly open up new avenues for attackers to exploit. This worry has given rise to a widespread misconception that security or agility is a binary choice.

But a growing number of organizations are challenging this stereotype and actively working to integrate security into the DevOps process. These proactive players in the agility game are acting on two basic principles and responding to two basic realities. One is that effective security is built in, not bolted on — meaning that even if agility were not an issue, security needs to be an integral part of the development process. The second principle is that attackers are agile, which means that security must also be agile.

Integrating Security Into the DevOps Process

A recent DigiCert survey titled “Making Security Agile” queried 300 enterprise leaders to determine “whether organizations are breaking down silos and inviting security to join the DevOps movement.” The survey revealed that these leaders put strong and nearly equal emphasis on increasing information security (90 percent), IT agility (88 percent) and development agility (87 percent).

Clearly, the respondents believe that they don’t need to choose between security and agility. Instead, they can integrate them and achieve both.

One significant challenge the survey found is that working faster often results in increased risk, while maximizing security sometimes means slowing down operations. The report suggested “changing how security works within the organization.”

Nearly half of respondents (49 percent) reported that they had already integrated security into the DevOps process, while another 49 percent said that they were working on completing that integration. Only 2 percent expressed no interest in doing so — a number so small that it may merely represent people who misread the question.

The greatest practical challenge, according to the survey, is that integration takes longer than most organizations anticipated: one to two years, as opposed to the typical expectation that it would take seven to 11 months.

Agility and Active Security

The survey specifically advised organizations to establish a social leader “to drive cultural change.” It also recommended limiting access, using encryption within an automated public key infrastructure (PKI), and investing in automated certificate management, patch management, vulnerability scanning and stack code analysis. These specific recommendations encapsulate the whole range of practical requirements for overcoming the security or agility conundrum.

But what stands out in the broader picture is how natural this integration is. When security is integrated into development, the result is an inherently robust architecture in which basic protective measures have been built in from the outset.

This security architecture is flexible when it comes to handling new threats because it is built with strong components that already achieve the basics and can be reconfigured as the threat environment changes. Agility thus includes an agile response to threats, making security more effective.

Rather than a false choice of security or agility, it turns out that agility is the right choice for enhanced security.

More from Application Security

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers

Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers are using this technique to achieve their objectives. It is therefore important that we put a spotlight on this capability and learn more about its potential impact. Specifically, in this post, we will evaluate how Kernel post-exploitation can be used…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…