A DevOps toolchain includes open source and commercial tools to aid in the delivery, development, and management of applications through the software delivery process using DevOps practices.
DevSecOps builds on top of your existing toolchain. If your organization is fast-forwarding straight to DevSecOps, think of it as a few more steps to securing your toolchain.
Here are some actions you can take to upgrade your DevOps toolchain into a DevSecOps toolchain:
Learn from others in the DevOps and DevSecOps communities
One of the great joys of the DevOps and DevSecOps communities is the fact that practitioners will share their knowledge and experience with open source and commercial DevOps and DevSecOps tools.
Sites such as Opensource.com and DevOps.com cover a range of toolchain topics throughout the year. DevOps-related conferences are even easier to attend during the pandemic. All Day DevOps is an all-virtual conference that draws in a range of practitioners with coverage over many of the pressing toolchain challenges teams are facing right now. Local DevOps and DevSecOps meetups are another useful resource for learning.
Start with your container security
The first step to building out the security of your DevOps toolchain starts with your container security. Here are two foundational elements of any DevSecOps container security strategy:
- Software bill of materials (SBOM) generator that generates a comprehensive bill of materials so you can track dependencies in your project or discover hidden files in somebody else’s project
- Vulnerability scanner to generate a list of known vulnerabilities quickly that exist within a container image or project directory
There’s a natural split in container security shaping up in the market right now. On one side, you want a container security solution that works in your build environment. A security solution that you can run via automation when you create a build. Look for a container security solution that’s application programming interface (API) friendly with a vendor or open source software (OSS) project that has a solid track record with API management.
Institute Continuous Compliance
DevSecOps is a platform for continuous compliance to protect your software supply chains against vulnerable packages and vulnerable configurations. While you may have made some initial moves to dependency scanning, it will not help you (or your compliance) if your infrastructure policies leave your AWS S3 buckets wide open.
Increasingly, container image scanning tools are doing double duty as compliance scanning to check for configuration issues during the development cycle before the non-compliant container enters production. Whether your team works on commercial or federal government projects, there are infrastructure security controls to follow, such as CIS Benchmarks or Secure Technical Implementation Guides (STIGs).
When choosing an image scanning tool, look for one that offers security control profiles that compare profiles versus the controls in the compliance matrices your organization needs to comply with.
Double down on Automation
While you may have already been experimenting with automation during your DevOps phase, it only becomes more integral once you throw the switch in by going DevSecOps. Go into your DevOps to DevSecOps transformation with an automation strategy that focuses on automating common developer and sysadmin tasks. Here are some common automation steps to take:
- Automate orchestration for containers and virtualized environments.
- Enhance application inventory by generating a software bill of materials (SBOM) automatically
- Automate cloud security features and controls that make sense
- Automate security tests that you can run in conjunction with automated regression testing
Improve your monitoring and analytics
Building out a DevSecOps toolchain takes your monitoring and analytics options to a new level. Consider the fact that you should already collect and publish data from your toolchain and deliver reports to your project managers, developers, QA testers, and stakeholders outside your team. Commonly, DevOps reporting is still a work in progress for organizations. Use the introduction of new security tools into your toolchain as a chance to offer more granular and real-time security reporting into all parts of your DevSecOps toolchain
Implement Accessibility Assurance
Depending on your organization’s definition of compliance, the option is there to add accessibility compliance or Section 508 to your DevSecOps toolchain. Accessibility compliance means your commercial application is universally inclusive of all users. Section 508 compliance is a requirement for all federal agency applications before they launch. Remediating accessibility issues in production can be costly for businesses. Federal agencies want to resolve their compliance issues in development to pass their 508 compliance check. Both scenarios benefit from continuous feedback on application changes you meet in production.
While adding tools such as Pa11y and Google Lighthouse to your DevSecOps toolchain will not make your developers accessibility experts by any means but they will alert them if the application they’re building isn’t in compliance. While your accessibility experts are working on accessibility policy and law concerns, your developers can enter tickets into your project tracking software to alert them to issues that require further investigation and remediation.
Whether you’re starting with DevOps toolchains, the ones you already have in place and that your teams are already familiar with, or making the leap, there are security options you can integrate into most stages of your build process. Take what steps you can to ensure that your developers and security team collaborate during the build-out of security tools. It’s also a good time to get any input from your auditors about the tools and processes for impartial analysis, this important step in your DevSecOps journey.
Lastly, don’t be afraid to iterate from the lessons you learn after turning on your additional security and compliance checks.