IDG Contributor Network: 5 practical ways your organization can benefit from DevSecOps

IDG Contributor Network: 5 practical ways your organization can benefit from DevSecOps

It’s right there in the moniker: DevSecOps , a portmanteau of Development, Security and Operations,  implies introducing security early on – as a part of a comprehensive, agile Software Development Life Cycle (SDLC) used by your organization, rather than doing so iteratively or waiting until after a release.

Given how security breaches and vulnerabilities have become everyday news, it makes little sense for developers to ignore the seriousness of secure coding anymore. Here’s a little secret though: developers are often not the most security-oriented folks for obvious reasons. It is not their primary duty. The priority for a software developer is to build an app, have it carry-out the intended tasks nicely and perhaps account for the overall user experience (UX) and satisfaction. If they are being diligent, they may incorporate basic ‘security checks’ as a part of their coding processes – such as not blindly trusting user input and sanitizing it, but beyond that, a developer may not alone have adequate bandwidth or expertise to incorporate the most superior security checks in an app.

A moment of honesty: despite working in DevSecOps for Sonatype I did not understand upfront what the buzzword meant for quite some time. I often questioned myself, “where does the benefit lie for organizations in this? Is this all a marketing fad?”

Over time, I have observed a trend and upward push in the industry to implement some sort of inherent ‘security’ as a part of their development workflow and here are the 5 benefits that immediately come to mind.

1. Spot vulnerabilities and bugs early on

While a developer may do their due diligence with regards to implementing basic-level security checks, nobody can know in this vast open-source ecosystem with millions of repositories, as stated by GitHub, how many software packages contain a security vulnerability and in which of its versions. Provided the huge volume, it is just impossible to be aware of it without having some sort of security automation in place.

The National Vulnerability Database (NVD), a U.S. NIST initiative, which by no means is a comprehensive or accurate list, just crossed their 100,000th vulnerability in 2018, with more vulnerabilities being added every day. This does not always include the “security exploits” and issues being posted on GitHub or ExploitDB.

9 warning signs of bad IT architecture and see why these 10 old-school IT principles still rule. | Sign up for CIO newsletters. ]

2. Leverage open source with increased confidence

Since the open-source community traditionally has welcomed contributions from ‘anyone’, this also opens a door for abuse by malicious actors. In 2019, multiple reports of malware having been disguised as legitimate open-source packages came to light. While npm’s representatives were able to spot and “remove” these components from their servers, the process has not always been a quick one. An unsuspecting developer already using one of the compromised components would have no means of knowing this, unless an automated tool was in place to be able to constantly scan their project and point out any malicious open-source components. This is where IDE-integrated solutions can save the developers and an entire organization from blunder and embarrassment that may follow after making a release.

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780