Application Security

4/20/2018
06:00 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Trust: The Secret Ingredient to DevSecOps Success

Security practitioners must build trusted relationships with developers and within cross-functional DevOps teams to get themselves embedded into continuous software delivery processes.

RSA CONFERENCE 2018 - San Francisco - As evident by the speaker tracks and hallway discussions here this week at the RSA Conference, the marriage of DevOps and security principles driving the DevSecOps movement is finally gaining traction in the security community.

Old pros in cybersecurity are finally moving past the denial stage - "No, DevOps isn't a fad. Yes, it's possible to bake security into it." Now comes the hard part of evolving the security mindset, practices, and tools to suit the fast pace of DevOps methods and toolchains. 

There are a lot of logistics that go into the process, but the foundational effort that DevSecOps veterans say should to trump all others is that of trust-building. 

"You have to start with building trust. In order to do that, the first thing it takes is listening and understanding the development team's challenges," explained Bankim Tejani, senior manager of digital product security for Under Armour. "What are they trying to accomplish? How are they doing it? Why they're using this particular tooling? What kind of scale are they gaining out of it? What kind of efficiencies are they gaining out of it? Then align what you're doing with security to that, to support that."

This was a theme that continually came up during Monday's DevOps Connect event, and it was further expounded upon by appsec experts and DevSecOps-savvy security leaders here this week. Security and development experts explained that at the end of the day, failed attempts to add security into the DevOps process can be chalked up to a fundamental lack of trust from the dev team.

Security's attempts to force impractical policies and overly ambitious fix rates cements the belief in DevOps teams that security won't ever understand what it means to deliver software in modern enterprise. And when the developers don't believe security has their back, they stop answering security team emails. They stop attending meetings called by the CISO's minions. And they otherwise disintermediate security from the day-to-day processes of delivering software. At that point, the security team enters the "nag zone."

According to a survey released this week by Sonatype that primarily questioned the developer community, 72% of participants see security not as trusted partners, but as "nags." That nag cred is quickly earned when the security team goes to the developers with binders full of vulnerabilities that are unprioritized and have no guidance for how they need to be fixed with a mandate that they're all acted upon.

Caroline Wong, vice president at Cobalt.io and a speaker at the conference, owned up to this kind of activity in past lives at organizations like eBay and Zynga. She explained that the path to DevSecOps epiphany and improved trust was to stop mandating and start asking questions.

"The first thing that we started to try to do was to ask some questions that we had not asked before. Specifically, what's important to you? Asking the developers and the technology teams, 'What are you trying to accomplish?'" she says. "It turns out, developers have things like quarterly goals and deadlines and they're trying to make new features so they can make money for the business. And when we were approaching them with these piles of work to do, that did not instill trust."

The more her teams could do the work of prioritizing the vulnerabilities that really meant something to the business risk posture and the work of advising developers to find a path to making fixes, the more trust her team could build.

It's also crucial for security teams to do a reality check and honestly decide what kind of security improvements can be asked for in the context of demands made on developers by the business. For example, when her appsec team asked developers how much time they could honestly spend on the rework of vulnerability fixes, the honest goal that they came up with together was a 20% reduction in flaws on customer-facing websites.

"Now 20% is not a number that security people like. Security people like a number like 90%, or a number like a number like 95%," she says. "But if we'd gone in and said 'We're going to try to eliminate 90% of the bugs on the website,' we probably would've gotten the same response that we got before, which was people stop coming to our meetings, people stop inviting us to our meetings, people stop reading our e-mails."

Ultimately, security people need to keep a couple of core interpersonal elements in mind when they're establishing trust within DevOps teams, says Larry Maccherone, who is currently driving a DevSecOps transformation at Comcast as the senior director in the company's Technology and Product division's Security and Privacy group.

"I have this formula for trust. It's credibility, plus reliability, plus empathy, all divided by apparent self-interest," he says. "Now, self interest is never zero. I wouldn't be spending my time talking to you if there wasn't some self-interest. But the more of that there is the more you need on the numerator to make up for that."

So as security professionals building trust with devs, it means establishing credibility by understanding the developer tools and developer lingo inside and out. Maccherone does this by exclusively hiring developers on his security staff. It means having developer's backs by doing the stuff you tell them you're going to do.

And it means really striving to understand the developer's ethos, to empathize with the things they struggle with. All of that makes it a lot easier for devs to trust you as a security person when you turn around and start asking for things, he said.

As a part of that equation, it's also important to remember the simple life principle that you've got to give a little to get a little. As Paula Thrasher, director of digital services at government integrator CSRA, explained, one of the first situations she worked in that truly established trust was where embedding security tools into an overall developer tool chain ended up speeding up the development process, while also making it more secure.

"That was a huge 'ah-ha' moment for me. That to really bring adoption, one it has to be really collaborative, but two there's got to be a compelling case for the effort that developers have to put in, they're going to get something back out of it," she said.

Related Content:

 Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6691
PUBLISHED: 2019-01-23
phpwind 9.0.2.170426 UTF8 allows SQL Injection via the admin.php?m=backup&c=backup&a=doback tabledb[] parameter, related to the "--backup database" option.
CVE-2018-19019
PUBLISHED: 2019-01-22
A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
CVE-2019-6260
PUBLISHED: 2019-01-22
The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console u...
CVE-2018-19011
PUBLISHED: 2019-01-22
CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.
CVE-2018-19013
PUBLISHED: 2019-01-22
An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file.