Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Extending the DevOps Model to Achieve Operational Excellence and Improved Security

The DevOps movement seeks to improve the integration of development and operations teams with the ultimate goal of accelerating the delivery of critical applications. Traditionally, these teams have been at a crossroads because their goals compete: developers want to add more features to their applications while operations teams want to ensure the stability – which means LESS change.

The DevOps movement seeks to improve the integration of development and operations teams with the ultimate goal of accelerating the delivery of critical applications. Traditionally, these teams have been at a crossroads because their goals compete: developers want to add more features to their applications while operations teams want to ensure the stability – which means LESS change.

But as we all know, in a grueling 24×7, global business environment, change is fairly constant. While new features and functionality need to be churned out faster, stability and availability of critical applications must be at 99.999% or better. It’s the reality for those organizations that want to stay competitive. Hence, we have the DevOps movement, driving development and operations teams to work more closely together. This improved collaboration should not stop here though… what about security?

Improving Software SecurityTraditionally, security has been viewed by these teams as a bottleneck because security by nature is to add checks to the process of making changes and pushing out new capabilities. But I think most would agree that security, especially considering the rising volume and sophistication of cyber-attacks, is a vital component of a successful organization. So the question becomes… how can we maintain or even improve security, while continuing the movement of increased agility?

By including security into the DevOps model, organizations can attain that improved agility and operational excellence while also improving the necessary checks and balances before changes are pushed into production. As more organizations look to add next-generation infrastructure and move from physical data centers to private/hybrid clouds, the integration of security with DevOps becomes even more important. Let’s examine how to integrate security into DevOps by looking at the three C’s:

Collaboration – Collaboration between three disparate, yet linked teams is important, especially when considering the process for making security changes. Instead of working in silos, if all of the key stakeholders understand and are involved in the change process from the beginning, you can ensure the proper checks and balances and provide the proper visibility from all angles (i.e. application connectivity needs, security and compliance checks, and broader network requirements). Improving the collaboration between these teams doesn’t only enable a more secure and agile network environment, but also provides opportunities to examine other strategies to further improve the business. Automating more processes can aid in forcing collaboration – as well as communication, which we’ll look at next.

Communication – According to a recent survey of approximately 620 enterprise engineers conducted by RebelLabs, traditional IT Ops teams require 41% more time for communication and 26% more time for firefighting than DevOps oriented teams. They also spend less time on task automation and infrastructure improvements. Communication obviously is tied tightly with collaboration – hard to have one without the other. No more is this readily apparent than in the security change process, where an application owner may request a connectivity change, network operations must process the change and security must ensure the change is made in a secure manner that doesn’t create new risk.

Co-ownership – The DevOps model embeds each team more into the fabric of the other. Developers shouldn’t simply throw code over the fence to operations to push into production and operations shouldn’t stay away until code is ready to be implemented in a production environment. The same goes for infosecurity. The information security team should be involved with the developers from the start to make sure the application code is secure and with operations to ensure that changes pushed into the network don’t create new risk. Sharing the responsibility across these teams facilitates teamwork and helps improve the process around publishing new functionality as well as demonstrating compliance, security enforcement, and operational efficiency.

Agility is the name of the game, and it shouldn’t stop at DevOps.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...