By 2023, more than 70% of enterprise DevSecOps initiatives will have incorporated automated security vulnerability and configuration scanning for open-source components and commercial packages, which is a significant increase from fewer than 30% in 2019.
Automated security vulnerability and configuration scanning are amongst the DevSecOps best practices that Gartner addresses in their 12 Things to Get Right for Successful DevSecOps with insightful analysis.
This Gartner Report is a veritable DevSecOps guide that addresses the following topics:
Here are some notable highlights from the report:
Modern software is often assembled, not developed. Developers make heavy use of prebuilt components, libraries, containers and frameworks (such as Apache Struts and Swing) from publicly available sources and repositories (such as GitHub, SourceForge, Maven and Docker Hub). Custom code often represents a minority percentage of the code in a modern application.
The increasing reliance on open source software (OSS) is driving changes to security scanning and large enterprises implementing pre-approved component libraries for reuse by DevOps teams across their organization. Gartner’s analysis cites that the actual code a developer writes is less than 10% of the final application.
When you make such a shift to security scanning of component libraries for vulnerabilities known configuration issues you save time and preserve team productivity.
Being able to tell the difference between what code was used (versus what code is actually exercised in production) is essential. It becomes a way to harden the application in future iterations by removing unused components, or to lower the risk if these components are later found to be vulnerable, but aren’t actually used.
Having mature source code version control throughout your DevSecOps lifecycle is a necessity as you work to increase your delivery velocity. Your enterprise needs to support version control using distributed version control systems (DVCS) and application lifecycle management (ALM) tools.
Although most DevOps infrastructure tools provide at least basic role-based access control (RBAC) — which should be leveraged as a minimum baseline control — the rapidly changing DevOps environment and blurring of functional borders can challenge static access controls. Because of this, consider the use of dynamic access provisioning, such as zero trust network access (ZTNA) control for developers.
The recent Cybersecurity Executive Order and fallout from the SolarWinds and Codecov hacks are going to fundamentally change how enterprises secure their development tools and infrastructure. Chief Information Security Officers (CISOs) and security teams will be looking to zero trust to shore up their security of their software supply chains, DevSecOps tool chains, and other development infrastructure.
For modern, microservices-based applications that are updated frequently, there is an operationally more secure way to maintain these applications. Where possible, no person should be allowed to make changes directly on production systems. The infrastructure is considered “immutable.”
Using containers and microservices to improve software delivery velocity means you need to take extra steps to protect your production environment. When you make changes and updates to software, that work should now take place in your development environment, not in production. You can then deploy changes and updates from a secure repository into your development environment via automated tools in your DevOps toolchain.