The Great Security Shift to the Left – InApps is an article under the topic Devops Many of you are most interested in today !! Today, let’s InApps.net learn The Great Security Shift to the Left – InApps in today’s post !

Read more about The Great Security Shift to the Left – InApps at Wikipedia



You can find content about The Great Security Shift to the Left – InApps from the Wikipedia website

Twistlock sponsored this podcast.


The Great Security Shift to the Left

Also available on Apple Podcasts, Google Podcasts, Overcast, PlayerFM, Pocket Casts, Spotify, Stitcher, TuneIn

An organization may have made the great leap of integrating previously siloed teams in its software development and deployment processes by adopting DevOps practices. And for some security teams, while that scenario may even be the case, security code integration and processes is similar to a tennis match: the developers add the code, which is then volleyed over to the security team before sending the now-securitized code back to the developers who then send it back to security again for a final check. Or worse still, the security team does give its input until just before deployment, creating potential bottlenecks when getting the security right takes longer than expected. (And even worse still, of course, apps are shipped with glaring security holes and are only patched after a major breach).

Call it an example of DevOps growing pains if you will, but the need very often exists for security to “shift left” in continuous integration/continuous delivery (CI/CD) processes, Sonya Koptyev, director of evangelism at Twistlock, said in this episode of InApps Makers podcast hosted by Alex Williams, founder and editor-in-chief of InApps.

The topic of improving the integration of security in the build-and-deploy processes was also expected to be a major theme of the RSA conference held this week. “I am super-excited for this conference. I’ve heard a lot about it and I’ve heard folks talking about it in the industry during my previous roles throughout my career — so, I am excited about having a front seat, and even more so than a front seat, I would say,” Koptyev said. “I think some of the trends that I’m hoping that we see in some of the content and discussion topics that are floating around as these folks mingle in all the different ways is really, the shift, I would say, from having security [in general], cloud native security and just application security topics really start to shift left, and I think, we’ve been talking about this for a little while now — at least a year and a half.”

Read More:   5 DevOps Pitfalls to Watch Out for – InApps 2022

Some of the workflow processes that are emerging as a more “all-hands-on-deck approach” in DevOps for security is taken, directly involves, of course,  CI/CD integration, Koptyev said. “As folks build out their pipelines to include automation from the start into the actual app-development lifecycle, it’s all about how you have security integrated into these pipelines as well. So, not only  to build and push into production, but also how do you make sure you have proper security thresholds set in that deployment process  so that you do not allow the app out of development and you do not deploy it unless it passes certain security thresholds — this is a particularly important workflow,” Koptyev said. “And to make sure that at runtime, you have all the right thresholds and alert sets and all of the blacklisting of potential  malicious processes  set, while defining those right off the bat and  automating them into the build process.”

Previously, in the enterprise space, “you [often] had folks coming from a very much waterfall approach to life,” Koptyev said. “So, they build the app and then they hand it off to security they tell them what to fix and off it ships into production,” Koptyev said. “But now, with this always-on continuous build and deployment,  availability of the app and constant updates happening; you have a workflow in a process that really needs to get updated as well,” Koptyev said. “Just as we have updated our build, continuous deployment, availability of the app and constant updates. So,  just as tooling is updated to automate build processes, we [as an industry] need to update how we think about also integrating security into that flow.”

In this Edition:

1:30: What are some of the things you expect to see at RSA, and what are the particular trends that you’re starting to get a sense of?
9:04: The overall complexity of container and cloud-native security.
10:17: Discussing runC and what Koptyev and Twistlock found in their research.
14:40: Exploiting vulnerabilities by running malicious images and symbolic links within your container.
16:05: What are some of the namespace mistakes that you see made?
20:20: When you think about networking security in a container context, what’s that Twistlock point of view?

Read More:   Update Riak’s NoSQL Database and its New Fit with Apache Mesos

Feature image via Pixabay.



Source: InApps.net

Rate this post
As a Senior Tech Enthusiast, I bring a decade of experience to the realm of tech writing, blending deep industry knowledge with a passion for storytelling. With expertise in software development to emerging tech trends like AI and IoT—my articles not only inform but also inspire. My journey in tech writing has been marked by a commitment to accuracy, clarity, and engaging storytelling, making me a trusted voice in the tech community.

Let’s create the next big thing together!

Coming together is a beginning. Keeping together is progress. Working together is success.

Let’s talk

Get a custom Proposal

Please fill in your information and your need to get a suitable solution.

    You need to enter your email to download

      [cf7sr-simple-recaptcha]

      Success. Downloading...