{"id":39118,"date":"2020-03-02T09:30:36","date_gmt":"2020-03-02T14:30:36","guid":{"rendered":"https:\/\/sdtimes.com\/?p=39118"},"modified":"2020-03-24T09:46:16","modified_gmt":"2020-03-24T13:46:16","slug":"how-to-get-devsecops-right","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/","title":{"rendered":"How to get DevSecOps right"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/sdtimes.com\/tag\/devops\/\">DevOps<\/a> and <a href=\"https:\/\/sdtimes.com\/tag\/security\/\">security<\/a> teams are learning how to work together, albeit somewhat awkwardly in these early days of <\/span><a href=\"https:\/\/sdtimes.com\/tag\/devsecops\/\"><span style=\"font-weight: 400;\">DevSecOps<\/span><\/a><span style=\"font-weight: 400;\">. One reason why it can be difficult to get the partnership &#8220;right&#8221; is that people define DevSecOps in different ways.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;If you asked a room of 10 people to define DevSecOps, you&#8217;d get 15 definitions. I think we&#8217;re starting to coalesce, but I still think there are a lot of misconceptions and there are still a lot of people who are going about it the wrong way,&#8221; said Caleb Queern, principal at <\/span><a href=\"https:\/\/home.kpmg\/xx\/en\/home.html\"><span style=\"font-weight: 400;\">KPMG Cyber Security<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.<\/span><\/p>\n<p><strong>RELATED CONTENT:\u00a0<\/strong><br \/>\n<strong><a href=\"https:\/\/sdtimes.com\/devops\/creating-a-devops-culture\/\">Creating a DevOps culture<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/sdtimes.com\/devops\/ci-cd-pipelines-are-expanding\/\">CI\/CD pipelines are expanding<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;A lot of buyers will procure something, put it in place in their organization and declare victory,&#8221; said Queern. &#8220;It doesn&#8217;t lead to the business outcomes that most folks are looking for.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a December 2019 <\/span><a href=\"https:\/\/www.gartner.com\/en\/documents\/3978490\/12-things-to-get-right-for-successful-devsecops\"><span style=\"font-weight: 400;\">report<\/span><\/a><span style=\"font-weight: 400;\">, Gartner estimated that by 2021, DevSecOps practices will be embedded in 60% of rapid development teams, as opposed to 20% in 2019. To succeed, DevOps teams must prioritize security and security teams must adapt to the accelerating pace of development.<\/span><\/p>\n<p><b>Is shifting left enough?<\/b><br \/>\n<span style=\"font-weight: 400;\">DevSecOps reduces the number of application vulnerabilities, but shifting left is not enough.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Shift left has truly moved the needle on capturing a lot of these early-stage, often ignored, vulnerabilities [but] it doesn&#8217;t necessarily solve all of the security challenges for an organization,&#8221; said Jake King, co-founder and CEO of Linux security platform provider <\/span><a href=\"https:\/\/cmd.com\/\"><span style=\"font-weight: 400;\">Cmd<\/span><\/a><span style=\"font-weight: 400;\">. &#8220;We have to be vigilant, we have to be aware, we have to be continuously testing.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Application exploits are the most common way hackers infiltrate organizations. So, in addition to running a Common Vulnerabilities and Exposures (CVE) scan late in the SDLC, shifting security left adds another security point. However, security should be integrated into every aspect of the application life cycle because as a recent <\/span><a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-the-new-norm-trend-micro-security-predictions-for-2020.pdf\"><span style=\"font-weight: 400;\">Trend Micro report<\/span><\/a><span style=\"font-weight: 400;\"> states, &#8220;Attackers will find ways to take advantage of any weak link to compromise the DevOps pipeline.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;[Application] security has kind of been looking at the trees and missing [the] forest,&#8221; said Zane Lackey, former chief information security officer (CISO) at ecommerce marketplace Etsy. &#8220;Trying to sprinkle a little bit of security dust at the end or at the beginning [means] you&#8217;re missing the forest, which is that you need to be empowering teams to think about and have security capabilities from when they&#8217;re designing new services to when they&#8217;re implementing them to when they&#8217;re actually deploying and running them in production.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sandy Carielli, principal analyst at Forrester Research, agrees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;We need to make sure we&#8217;re not just addressing security in the design and development phase, but also in the testing and deployment phases,&#8221; said Carielli. &#8220;It absolutely needs to be addressed throughout the life cycle. The vulnerability is going to survive for a much shorter lifetime if there is regular scanning.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">End-to-end application security results in more secure code. And, full life cycle visibility into exploits helps teams understand how and where their applications are being compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The way security was done historically frustrates developers. You wait until the very end and it takes a week for them to get back results. And a lot of the tools that we&#8217;ve used historically, things like static analysis, create an unacceptable [number] of false positives,&#8221; said Neil MacDonald, vice president, distinguished analyst and Gartner fellow emeritus in Gartner Research. &#8220;It&#8217;s the antithesis of what we want for DevOps. We&#8217;re supposed to be enabling speed and agility and so security has to shift left, integrate natively into the developer&#8217;s environment and catch these problems as soon as possible so the developer isn&#8217;t slowed down at the end.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, baking security into the entire SDLC takes time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;This isn&#8217;t something that you finish, ever,&#8221; said KPMG&#8217;s Queern. For one thing, black hat tactics are constantly evolving.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s also important to pay attention to access rights.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;It&#8217;s not so much about technology components, but how you&#8217;re divvying up who does what,&#8221; said Fernando Montenegro, principal analyst, information security at 451 Research. &#8220;If I have an artifact here, am I allowed to interact with it? Am I allowed to do something with it? Do I have the right credentials to do dev versus QA testing versus production etc.? And then at runtime, is this thing behaving the way it&#8217;s supposed to behave and if something goes wrong? Do I have the infrastructure to understand what happened? You absolutely need that across the stack.&#8221;<\/span><\/p>\n<p><b>What the DevSecOps team should look like<\/b><br \/>\n<span style=\"font-weight: 400;\">Moving from DevOps to DevSecOps isn&#8217;t a matter of putting a security team member on a DevOps team, because developers tend to outnumber security professionals by <\/span><a href=\"https:\/\/www.sonatype.com\/2018survey\"><span style=\"font-weight: 400;\">100 to one<\/span><\/a><span style=\"font-weight: 400;\">. Since most developers aren&#8217;t security experts and most security experts aren&#8217;t developers, the two must learn to work together effectively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Research shows that the places where we talk more about security, we&#8217;re better at security,&#8221; said Queern.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Queern and others interviewed for this story underscored the importance of &#8220;security champions&#8221; who serve as the security expert on a DevSecOps team. Security champions are usually a developer who volunteers for the role. In Queern&#8217;s experience, the security champion participates in labs, demos or presentations that focus on security and application development best practices. While the application security team may host the trainings, the presentation duties are very quickly assigned to the security champions who will serve as security experts for their teams.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Health management platform provider <\/span><a href=\"https:\/\/advantasure.com\/\"><span style=\"font-weight: 400;\">Advantasure<\/span><\/a><span style=\"font-weight: 400;\"> has a security liaison who works across more than 500 developers, according to Chief Information Security Officer (CISO) Wallace Dalrymple. The security liaison is responsible for upskilling the developers who will become security champions. Specifically, the liaison oversees their e-learning training programs and is the first escalation point when a security-related question or issue arises.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ROI on training dollars tends to be poor if the person attending training doesn&#8217;t apply the newly acquired knowledge on a regular basis, however.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The best type of training is training in the moment. Having that training built into the development process a little more closely will allow the teams to start absorbing it and living it a lot more,&#8221; said Forrester&#8217;s Carielli.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Charles Betz, global DevOps lead serving infrastructure and operations professionals at Forrester, thinks it&#8217;s important to provide DevSecOps teams with secure baseline infrastructure environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;In many cases, people just don&#8217;t know what needs to be secured,&#8221; said Betz. &#8220;So, give them an image that&#8217;s secured, give them an environment that&#8217;s secure, give me acceptable patterns for using the database, using Apache Kafka, using a load balancer in the firewall. Then, have them focused on what they need to be focused on.&#8221;<\/span><\/p>\n<p><b>What the relationship with the security team should<\/b><b> l<\/b><b>ook like<\/b><br \/>\n<span style=\"font-weight: 400;\">There&#8217;s a diversion of opinion about who should initiate the DevOps-security relationship. Should DevOps reach out to security or should security reach out to DevOps? There has been some friction in the relationship because security has served as a barrier to faster application releases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;There&#8217;s no time for old school security testing every release. Fundamentally, security should be something that&#8217;s just like quality. It&#8217;s one of the fundamental requirements of your code,&#8221; said 451 Research&#8217;s Fernando Montenegro. &#8220;The role of security is collaborating with that development team to let them know what it is that they need to do. Here are our corporate objectives around security and the kinds of things that we want you to be aware of. Here&#8217;s how you threat-model your application to define what needs to happen where and then let the development team run with it.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Traditionally, security&#8217;s first instinct is to prevent developers from introducing risks in the first place. For example, Etsy&#8217;s former CISO Zane Lackey recently met with the CSO and CIO of a Fortune 100 company separately, about 30 minutes apart. When he asked each of them how they think about cloud and DevOps, the CSO said he wasn&#8217;t allowing them to happen because they&#8217;re not secure. The CIO subsequently said they had 50 cloud apps now. By the end of the year, they&#8217;ll have 200 and in 2021, a couple thousand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;I looked at him kind of funny, and he said, &#8216;Oh, you just met with the CSO,\u2019 &#8221; said Lackey. &#8220;We don&#8217;t tell them [anything] anymore because they try to say no to everything. If they want to enable us, then we&#8217;ll incorporate that, but if they&#8217;re just going to be gatekeepers and say no, we&#8217;re not going to speak to them anymore.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Good progress is getting security and DevOps working together. Better progress is when security and DevOps cooperatively integrate security practices throughout the SDLC in a manner which doesn&#8217;t create friction in the DevOps pipeline.\u00a0<\/span><\/p>\n<p><b>Supply chain security matters<\/b><br \/>\n<span style=\"font-weight: 400;\">Developers are using more open-source and third-party elements in their code than ever before to meet time-to-market mandates and focus on what matters most, such as competitively differentiating their applications. However, Gartner estimates that fewer than 30% of enterprise DevSecOps initiatives had incorporated automated security vulnerability and configuration scanning for open source and commercial packages in 2019. That number is expected to rise to more than 70% in 2023.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Security needs to go all the way back to the point where they&#8217;re downloading code from GitHub. Let&#8217;s tell them this is a known vulnerable component. We&#8217;re not going to download that because it contains a known set of critical vulnerabilities,&#8221; said Gartner&#8217;s MacDonald. &#8220;Let&#8217;s tell them that before they download it, before they stitch it together in their application as they&#8217;re writing code in their IDE.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advantasure&#8217;s decision to implement application security platform Veracode was made jointly between security and DevOps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;We can&#8217;t dictate to the business, you must do it this way,&#8221; said Advantasure&#8217;s D<\/span><span style=\"font-weight: 400;\">alrymple. &#8220;It was really us reaching out to them and saying you&#8217;re going down this path. How can we be leveraged in your environment without having to hire an army of application security architects just to support you?&#8221;<\/span><\/p>\n<p><b>Measuring success<\/b><br \/>\n<span style=\"font-weight: 400;\">It&#8217;s hard to tell how effective DevSecOps is if it isn&#8217;t being measured. There are some of the classic methods like bug tracking and code coverage, although Forrester&#8217;s Betz said it&#8217;s important to start with the target operating condition.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;What is your risk tolerance? What are your metrics there? What are some of the desired metrics with things like code coverage and what level of assurance do you require in your systems?&#8221; said Betz. &#8220;Really look at your highest governance metrics that drive your security posture and how you understand your attack surface. Those drive your operational processes and procedures which will include things like software, bill of materials, supply chain, vulnerability scanning, pen testing and red team testing.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cmd&#8217;s King said time to detection and resolution of an infrastructure issue is important, as is code coverage and code hardening. Measuring customer perception is also wise because security is a trust issue.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;If you keep on top of it, if you incrementally add security, you bake it in from the start and add it early in your processes, you will see dividends paid up majorly in the long term because you will not be dealing with legacy,&#8221; said King.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another metric has to do with the collaboration between DevOps and security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;A common metric is the number of bugs and if they&#8217;re going down over time. This has probably done more disservice to application security programs than anything else because there&#8217;s a million questions within that that don&#8217;t get answered,&#8221; said Lackey. &#8220;The healthiest metric you can track is how often DevOps teams proactively interact with the security team because if those teams are proactively coming to you and focusing on that metric, whenever they think of new technologies or architectures you&#8217;re going to be able to reduce risk.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Teams also should be counting security incidents such as breaches and data leakages, insider and external exploits and advanced persistent threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;[Whichever way] you&#8217;re counting them you want to be baselining and continuously improving,&#8221; said Betz. &#8220;I strongly believe in benchmarking against yourself.&#8221;<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>DevOps and security teams are learning how to work together, albeit somewhat awkwardly in these early days of DevSecOps. One reason why it can be difficult to get the partnership &#8220;right&#8221; is that people define DevSecOps in different ways. &#8220;If you asked a room of 10 people to define DevSecOps, you&#8217;d get 15 definitions. I  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":534,"featured_media":39119,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[14797,1],"tags":[8988,254,8749],"coauthors":[11541],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to get DevSecOps right - SD Times<\/title>\n<meta name=\"description\" content=\"One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to get DevSecOps right - SD Times\" \/>\n<meta property=\"og:description\" content=\"One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-02T14:30:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-24T13:46:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"371\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lisa Morgan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisa Morgan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\"},\"author\":{\"name\":\"Lisa Morgan\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f8b37cd5064b4901b5f3d05f5769592a\"},\"headline\":\"How to get DevSecOps right\",\"datePublished\":\"2020-03-02T14:30:36+00:00\",\"dateModified\":\"2020-03-24T13:46:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\"},\"wordCount\":1994,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg\",\"keywords\":[\"application security\",\"DevOps\",\"DevSecOps\"],\"articleSection\":[\"Deeper Look\",\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\",\"url\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\",\"name\":\"How to get DevSecOps right - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg\",\"datePublished\":\"2020-03-02T14:30:36+00:00\",\"dateModified\":\"2020-03-24T13:46:16+00:00\",\"description\":\"One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg\",\"width\":660,\"height\":371},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to get DevSecOps right\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f8b37cd5064b4901b5f3d05f5769592a\",\"name\":\"Lisa Morgan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/665814f19ddb9ca9cd60d598c7209bf5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5246c3be66841f9341b570049ef6ed6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5246c3be66841f9341b570049ef6ed6?s=96&d=mm&r=g\",\"caption\":\"Lisa Morgan\"},\"description\":\"Lisa Morgan is a contributing editor to SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/lisa-morgan-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to get DevSecOps right - SD Times","description":"One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/","og_locale":"en_US","og_type":"article","og_title":"How to get DevSecOps right - SD Times","og_description":"One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.","og_url":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2020-03-02T14:30:36+00:00","article_modified_time":"2020-03-24T13:46:16+00:00","og_image":[{"width":660,"height":371,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg","type":"image\/jpeg"}],"author":"Lisa Morgan","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Lisa Morgan","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/"},"author":{"name":"Lisa Morgan","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f8b37cd5064b4901b5f3d05f5769592a"},"headline":"How to get DevSecOps right","datePublished":"2020-03-02T14:30:36+00:00","dateModified":"2020-03-24T13:46:16+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/"},"wordCount":1994,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg","keywords":["application security","DevOps","DevSecOps"],"articleSection":["Deeper Look","Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/","url":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/","name":"How to get DevSecOps right - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg","datePublished":"2020-03-02T14:30:36+00:00","dateModified":"2020-03-24T13:46:16+00:00","description":"One challenge is approaching DevSecOps from a tools-only perspective, without considering the impacts of change on processes and people.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2020\/03\/DevSecOps-DeeperLook.jpg","width":660,"height":371},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/devops\/how-to-get-devsecops-right\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"How to get DevSecOps right"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f8b37cd5064b4901b5f3d05f5769592a","name":"Lisa Morgan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/665814f19ddb9ca9cd60d598c7209bf5","url":"https:\/\/secure.gravatar.com\/avatar\/d5246c3be66841f9341b570049ef6ed6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5246c3be66841f9341b570049ef6ed6?s=96&d=mm&r=g","caption":"Lisa Morgan"},"description":"Lisa Morgan is a contributing editor to SD Times.","url":"https:\/\/sdtimes.com\/author\/lisa-morgan-2\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/39118"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/534"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=39118"}],"version-history":[{"count":4,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/39118\/revisions"}],"predecessor-version":[{"id":39330,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/39118\/revisions\/39330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/39119"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=39118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=39118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=39118"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=39118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}