DevSecOps Playbook
DevSecOps Playbook
UNCLASSIFIED
CLEARED
For Open Publication
Department of Defense
OFFICE OF PREPUBLICATION AND SECURITY REVIEW
DevSecOps Playbook
September 2021
Version 2.1
This document automatically expires 1-year from publication date unless revised.
UNCLASSIFIED
Unclassified
UNCLASSIFIED
Trademark Information
Names, products, and services referenced within this document may be the trade names,
trademarks, or service marks of their respective owners. References to commercial vendors and
their products or services are provided strictly as a convenience to our readers, and do not
constitute or imply endorsement by the Department of any non-Federal entity, event, product,
service, or enterprise
UNCLASSIFIED
UNCLASSIFIED
Contents
Play 1: Adopt a DevSecOps Culture .................................................................................................................. 4
Key Cultural Practices .................................................................................................................................... 4
Checklist ........................................................................................................................................................ 4
Play 2: Adopt Infrastructure as Code ................................................................................................................. 5
Key Advantages ............................................................................................................................................. 5
Checklist ........................................................................................................................................................ 5
Play 3: Adopt Containerized Microservices ........................................................................................................ 6
Key Characteristics of a Containerized Microservice ...................................................................................... 6
Checklist ........................................................................................................................................................ 6
Play 4: Adopt a Capability Model, not a Maturity Model ..................................................................................... 7
Checklist ........................................................................................................................................................ 7
Play 5: Drive Continuous Improvement through Key Capabilities ...................................................................... 8
Checklist ........................................................................................................................................................ 8
Play 6: Establish a Software Factory ................................................................................................................. 9
Checklist ........................................................................................................................................................ 9
Play 7: Define a Meaningful DevSecOps Pipeline............................................................................................ 10
Checklist ...................................................................................................................................................... 10
Play 8: Adapt an Agile Acquisition Policy for Software ..................................................................................... 11
Checklist ...................................................................................................................................................... 11
Play 9: Tirelessly Pursue Cyber Resilience...................................................................................................... 12
Checklist ...................................................................................................................................................... 12
Play 10: Shift Test and Evaluation (T&E) Left into the Pipeline ........................................................................ 13
Common Testing Categories........................................................................................................................ 13
Checklist ...................................................................................................................................................... 13
Play 11: (Industry) Lean, User-Centered, Agile Practices & Workshops .......................................................... 14
Collection of Lean, User-Centered, Agile Practices and Workshops ............................................................ 14
Popular Topics Related to Modern App Development .................................................................................. 14
3
UNCLASSIFIED
UNCLASSIFIED
Checklist
Learn what is involved in the DevSecOps culture.
Embrace automation for anything done repeatedly.
Read How to Build a Strong DevSecOps Culture by K. Casey, available online at:
https://enterprisersproject.com/article/2018/6/how-build-strong-devsecops-culture-5-tips
Read The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win by G. Kim, K.
Behr, and G. Spafford, IT Revolution Press, Jan. 10, 2013
Fail fast, learn fast, fail small, and do not fail twice for the same reason!
4
UNCLASSIFIED
UNCLASSIFIED
Key Advantages
• IT infrastructure supports and enables change, rather than being an obstacle or a constraint.
• Mitigates drift between environments by leveraging automation and push-button deployment.
• Enforces change management through GitOps with multiple approvers, as needed.
• Environmental changes are routine and fully automated, pivoting staff to focus on other tasks.
• Quicker recovery from failures, rather than assuming failure can be completely prevented.
• Empowers a continuous improvement ecosystem rather than “big bang” one and done activities.
Checklist
Learn how to describe the value proposition of IaC.
Understand the benefits of applying GitOps to infrastructure configurations.
Understand how IaC tooling selection is a trade-off between vendor lock-in or product lock-in.
Explore popular IaC tooling options, including:
– Terraform
– Ansible
– Chef
– CSP managed service tooling
5
UNCLASSIFIED
UNCLASSIFIED
Checklist
Research and understand the benefits of a microservices architecture.
Only adopt CNCF Certified Kubernetes to ensure software conformance of required APIs.
Leverage Iron Bank for hardened containers and other software artifacts.
Always inject the Sidecar Container Security Stack (SCSS) to maximize runtime security.
Always adopt a service mesh to further secure east-west network traffic.
1 Defense Acquisition University, “MOSA Defense Acquisition Guidebook, Ch 3-2.4.1.” [Online]. Available:
https://www.dau.edu/guidebooks/Shared%20Documents%20HTML/Chapter%203%20Systems%20Engineering.aspx#toc
20
2 The Linux Foundation Projects, “Open Container Initiative,” [Online] Available at: https://opencontainers.org.
3 Cloud Native Computing Foundation, “Software Conformance,” [Online] Available at:
https://www.cncf.io/certification/software-conformance/
6
UNCLASSIFIED
UNCLASSIFIED
Checklist
Become fluent with the four key metrics: deployment frequency, lead time, MTTR, and change failure
rate.
Evaluate your project and organization on each metric to measure DevSecOps capability progress.
Continuously strive to improve each metric through process and automation improvements.
Read The DevOps Handbook and learn The Three Ways 7
4 Google Cloud, “Explore DORA’s research program,” [Online]. Available at: https://www.devops-
research.com/research.html.
5 N. Forsgren, J. Humble, G. Kim, and, “Accelerate: The Science of Lean Software and DevOps: Building and Scaling
https://services.google.com/fh/files/misc/state-of-devops-2019.pdf
7 G. Kim, J. Humble, P. Debois, and J. Willis, “The DevOps Handbook: How to Create World-Class Agility, Reliability, and
Checklist
Read Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing
Technology Organizations.
Pay special attention to driving the cultural changes necessary for successful transformation.
8N. Forsgren, J. Humble, G. Kim, and, “Accelerate: The Science of Lean Software and DevOps: Building and Scaling
High Performing Technology Organizations.” 2018.
8
UNCLASSIFIED
UNCLASSIFIED
Checklist
Recognize that a software factory must align to the DoD Enterprise DevSecOps Strategy, comply
with all required DevSecOps Tools and Activities Guidebook, and clearly identify its interconnects
between the various layers, as defined within the DevSecOps Fundamentals document.
Software factories are inherently designed to be multi-tenet, and they are expensive to build and
operate; establish clear reasons why a new factory is required over adopting an existing factory.
9
UNCLASSIFIED
UNCLASSIFIED
Checklist
Read DoD Enterprise DevSecOps Fundamentals document.
Read DevSecOps Tools and Activities Guidebook.
Define a software lifecycle within the pipeline that uses management processes that meets the unique
needs of the mission environment, system complexity, system architecture, software design choices,
risk tolerance level, and system maturity level.
Do not try to implement the pipeline using a “big bang” approach – start small, iterate, automate
repetitive processes.
Recognize the value of the continuous feedback loops across the software lifecycle phases.
Work closely with the AO to understand precisely what each control gate must validate before an
artifact can be promoted to the next lifecycle phase.
Measure capabilities across each of the lifecycle phases.
10
UNCLASSIFIED
UNCLASSIFIED
• Establishes the Software Acquisition Pathway as the preferred path for acquisition and development of
software-intensive systems.
• Simplifies the acquisition model to enable continuous integration and delivery of software capability on
timelines relevant to the warfighter/end user.
• Establishes business decision artifacts to manage risk and enable successful software acquisition and
development.
Defense Acquisition University (DAU) provides training in the form of an interactive web application that
educates the audience specifically on the Software Acquisition Pathway, where agile software acquisition
processes are discussed in the context of acquisition personnel. For more information:
https://aaf.dau.edu/aaf/software/
Checklist
Review DoDI 8000.87 to understand the formal definition of what constitutes a “software-intensive”
system.
Review the DIB SWAP study’s key findings. 11
Review the acquisition guidance in the TechFAR hub, https://techfarhub.cio.gov/.
Recognize that the software can be acquired via DoDI 8000.87, while other program elements can be
acquired through different pathways.
Leverage Enterprise Level Services as a first choice, if available, before creating unique services.
Ensure your acquisition plan recognizes that technology enhancements never end.
Do not lock technical requirements into legal contracts; enable new technologies.
9 Office of the Under Secretary of Defense for Acquisition and Sustainment, “DoD Instruction 5000.02, Operation of the
Adaptive Acquisition Framework.” Jan. 23, 2020, [Online]. Available:
https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/500002p.pdf?ver=2020-01-23-144114-093.
10 Office of the Under Secretary of Defense for Acquisition and Sustainment, “DoD Instruction 5000.87, Operation of the
Available: https://innovation.defense.gov/software.
11
UNCLASSIFIED
UNCLASSIFIED
Checklist
Do not use Fast Track Authority to Operate for software produced by a DevSecOps software factory
CI/CD pipeline.
Pursue cyber resilience at each phase of the DevSecOps lifecycle.
Understand Recommendation B6, “Shift from certification of executables for low- and medium-risk
deployments to certification of code/architectures and certification of the development, integration, and
deployment toolchain.”11
Establish a continuous monitoring program.
Partner with your AO and help them move to near real-time metrics dashboard.
12 R. Ross, V. Pillitteri, R. Graubart, D. Bodeau, and R. McQuiad, “NIST Special Publication 800-160 Volume 2,
Developing Cyber Resilient Systems: A Systems Security Engineering Approach.” 2019–Nov., [Online]. Available:
https://doi.org/10.6028/NIST.SP.800-160v2.
13 National Institute of Standards and Technology, “Risk Management Framework for Information Systems and
Organizations: A System Life Cycle Approach for Security and Privacy (SP 800-37 Rev. 2).” Dec. 2018, [Online].
Available: https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final.
12
UNCLASSIFIED
UNCLASSIFIED
Play 10: Shift Test and Evaluation (T&E) Left into the Pipeline
The Defense Innovation Board succinctly summed the goal of this play like this: “Speed and cycle time are the
most important metrics for managing software. DoD must be able to deploy software faster without sacrificing
its abilities to test and validate software.”11
Developmental Test and Evaluation (DT&E) and Operational Test and Evaluation (OT&E) activities are
intended to gather data that helps leadership make informed decisions. The value of shifting test and
evaluation activities into the software factory’s pipeline is that risk is reduced by finding problems early and
fixing them fast while the change that created the problem is still in the forefront of the developer’s mind.
Integration continues to be difficult to achieve between disparate systems, and the push for access to raw data
to feed AI/ML algorithms is increasing, not decreasing. The ability to ensure these integrations work earlier in
the process, not as a bolt-on after-the-fact integration, drives the delivery of relevant software at the speed of
operations.
Tests must be planned, and the need for testing activities is formally identified within the DoDI 5000.87 and
DoDI 5000.89.10 Testers should receive formal training in both Agile and DevSecOps to ensure they are fully
integrated team members. Further, the DevSecOps culture emphasizes that everyone is responsible for testing
and quality regardless of team position or job title. The test plan must plan and identify the metrics that best
reflect functional and non-functional requirements and how the metrics will be collected in an automated
fashion, respectively. Lastly, and most importantly, the end user or their representative must be closely
involved in all aspects of testing and acceptance of an artifact as it transitions through the CI/CD pipeline.
Checklist
Start all T&E planning at the inception of the program to influence strategy, requirements, RFPs, etc.
Establish the plan to automate the collection of test data metrics in the first sprint.
Incessantly work to compress test reporting timelines as much as possible to speed corrections.
Include operational users in both Developmental and Operational Testing.
Incorporate all forms of Application Security Testing in the pipeline to ensure cyber resilience.
Consider functional, non-functional, and cyber testing at each of the eight phases of the DevSecOps
lifecycle.
13
UNCLASSIFIED
UNCLASSIFIED
Tanzu Labs has assembled a collection of guides and playbooks for topics like Spring, Kubernetes,
Containers, Microservices, Python, CI/CD, etc. They have also developed a collection of lean, user-centered,
agile practices and workshops for modern software application development. This material is used to build
Tanzu software as well as teach other software developers how to build their own modern software
applications.
These guides and playbooks are open source and available at the Tanzu Developer Center at the URLs
indicated below.
14
UNCLASSIFIED