Main » Blog »

DevOp's Role in Application Security

Nearly 70 percent of organizations that participated in an IBM/Ponemon Institute study published earlier this year said they lacked visibility into the overall state of application security. Further, 35 percent of them do not use any major application security testing methods to identify application vulnerabilities.

Most web applications have at least two serious security vulnerabilities at any given time, according to WhiteHat Security research published in June. The average time-to-fix application vulnerabilities is also trending upward, found the company. In 2015 this important metric was 150 days, up from about 100 days in 2013.

Traditional Application Security Strategies Are Not Working

This increase "indicates that traditional application security strategies of detecting and remediating are not working...," wrote WhiteHat Chief Marketing Officer Tamir Hardof on the company blog, adding, "Whether it's an issue around feedback between developers and security teams, a lack of security resources or too little involvement from the executive board, it's clear application security is a problem that requires organization-wide collaboration from developers, security practitioners and business leaders."

Sonatype, a company that manages a central repository of open source software components, uncovered some concerning application security issues related to the use of these components. For instance, 6.1 percent of downloads include a known security defect. This is a big problem, given that use of the components is skyrocketing. Sonatype's repository for Java components saw 31 billion requests for downloads in 2015, up from 17 billion in 2014.

"The application security professional's usual response to that is 'that doesn't mean those vulnerabilities ended up in our applications,'" said Derek Weeks, a VP and DevOps advocate at Sonatype, in an interview with eSecurity Planet. "But when we looked across 25,000 applications we saw an average of 6.8 percent of components across those apps had at least one known vulnerability. That tells me that from the beginning of the software supply chain to the end products developed through these supply chains, there isn't enough control."

While companies know security needs to become a more central part of application development, they are struggling with how to make this happen.

DevSecOps: A New Approach

DevSecOps is a new approach that holds promise, writes Cybric Chief Innovation Officer Mike Kail in a column for eSecurity Planet. Like DevOps, DevSecOps emphasizes collaboration and communication between software developers and other IT professionals while automating many elements of software delivery. Its technological linchpins are virtualization and containerization, and it seeks to create a culture based on the idea that everyone is responsible for security.

"To start adopting a DevSecOps approach means implementing automated sources to scan source code and all libraries up and down the stack in your organization, not just using point solutions," he writes. "It also means integrating security tools into a common platform via APIs. Everyone in the organization should be empowered to recognize that security is part of their responsibility."

Whether or not they call what they are doing DevSecOps, many DevOps teams are beginning to adopt some application security best practices, among them standardizing on third-party software and keeping it current and testing preparedness with security games.

Security games or war gaming typically involves creating two teams of developers, operations and security personnel: one team that launches attacks upon their own applications, supporting systems and networks and another that monitors for attacks, identifies breach points and defends the systems, explains Sonatype's Weeks, in a column written for eSecurity Planet.

War Game Exercises Good For DevOps Teams

In explaining why War Games exercises are a good idea for DevOps teams, Weeks writes: "Let's face it, no one really wants to be attacked; let alone be a victim of a successful breach. But there are two kinds of companies: those that have been hacked and those who don't know it. To beat the attackers at their own game, you need to think, plan and attack like them. By purposely subjecting yourself to ethical, friendly fire, you can improve and harden your defenses."


Enterprise Security Planet
Ann All is the editor of Enterprise Apps Today and eSecurity Planet. She has covered business and technology for more than a decade, writing about everything from business intelligence to virtualization.

 


Meenakshi Agarwal said on May 02, 2017 10:38 AM PDT

Interesting article on how DevOps role can be crucial in implementing application security. I've recently transitioned from my test QA profile to DevOps and it's been a great start so far. Anyways thanks for sharing this article.

John said on March 05, 2017 10:50 AM PST

Amazing Article! Most of the concepts are clear regarding DevOp's Role in Application Security. Can anyone suggest me to get some good security service for my Windows Server?

Machiavelli said on October 07, 2016 09:04 AM PDT

Very interesting article. I feel I need to brush up on my knowledge regarding DevOps... Thx!

Maheen shaikh said on October 02, 2016 02:11 AM PDT

Superb Post ! very interesting Now I clearly understand what SEO is all about .Thanks for such a wonderful piece of informtion

Make a comment






    (Maximum characters: 1200). You have characters left.


     


    LATEST ARTICLES
    Text Messaging & Chat Abbreviations

    This chat guide lists more than 1,460 text message and online chat abbreviations to help you translate today's texting lingo. Read More »

    SEO Dictionary

    From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need... Read More »

    Slideshow: History of Microsoft Operating Systems

    Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »

    STUDY GUIDES
    Computer Architecture Study Guide

    Computer architecture provides an introduction to system design basics for most computer science students. Read More »

    Network Fundamentals Study Guide

    Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

    Java Basics, Part 1

    Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »