AWS Devsecops
AWS Devsecops
A complete guide to
Implementing
DevSecOps in AWS
Table of contents
1. Chapter 1 Introduction 3
8. Chapter 8 Conclusion 14
Chapter 1
Chapter 2
Chapter 3
Chapter 1 Chapter 4
Chapter 5
Introduction
Chapter 6
Chapter 7
Chapter 8
With the business landscape evolving every passing due to the slow and vulnerable nature.
day, organizations are expected to stay at the cutting
edge to pacify their customers. Today, the first DevOps is a popular approach that makes
aspect that a customer looks for in an organization’s cybersecurity vigilance a reality by embedding
product or service offerings is the software – either the right tools into your software development
the mobile applications or the official website of lifecycle. In this eBook, we explain why and how
the company. Businesses have realized that to implementing DevOps into your existing AWS
hold the silver spoon against their competitors, Cloud applications is paramount for your business.
they need to keep reinventing their products or
services and always be the first candidate to enter
the market with a new set of offerings. This has
led to a faster evolution of software development
methodologies including Lean, Agile, DevOps etc.
to meet these requirements. In order to improve
quality, businesses are focused on the user needs
early in the project, involve development and
operations gradually, and break the project into
smaller pieces to allow for frequent testing. The
abundance of infrastructure-as-a-service (IaaS)
offerings has been an instrumental catalyst in this
transformation.
Chapter 1
Chapter 2
Chapter 3
Chapter 2 Chapter 4
Chapter 5
Big 5 Reasons to Opt DevOps
Chapter 6
Chapter 7
Chapter 8
Chapter 1
Chapter 2
Chapter 3
Chapter 3 Chapter 4
Chapter 5
What is DevSecOps?
Chapter 6
Chapter 7
Chapter 8
Reduced costs:
Early bug fixes
Improved software
security:
stringent security measures
Higher customer along the pipeline
value
Increased
Reduced time for recovery speed:
security checks: due to early threat
automated cybersecurity detections
Implementing an end-to-end DevSecOps pipeline smaller pieces, identifying the vulnerabilities in the
is critical to building a successful software initial stages of the development process will help
delivery, which includes continuous integration reduce costs and the automation aspect of the
(CI), continuous delivery and development (CD), process will accelerate the delivery as well.
continuous testing, logging and monitoring, auditing
and governance, and operations. As DevSecOps The below infographic shows the process carried
breaks down the software development cycle into out during the development phase of DevSecOps
security controls.
Secure
Secure by CI Server
Code Security Tests
Design deploys to
Training
Test DAST perform app
Gather threat and
Engineers gain specific automated
abuse case models Automated
awareness of security testing and
and security deployment via IaC
AppSec dynamic container
requirements. Adapt
principles and analysis. Validate
reusable secure by-
responsibilities controls are
default design patterns
mitigating the abuse
case threat sectors
Composition
Pre-commit Security
Analysis
configurations Review
for secret Analyze third (Human Logic
scanning Secure party/open source Test)
access to app, libraries. Reuse
code & Image secure code only Conduct
repository and comply with penetration testing
OSS licensing where it makes
Implement least sense.( Might not
privilege RBAC and be needed for every
new solution to code sprint)
and private container
repository IaC version
controlled
As we move to the production phase, here are a few things that the development teams must keep in mind:
Chapter 1
Chapter 2
Chapter 3
Chapter 4 Chapter 4
Chapter 5
AWS CI/CD and Support Tools
Chapter 6
Chapter 7
Chapter 8
In this chapter, we discuss the various AWS services and third-party support tools used in this solution.
AWS A fully managed continuous integration service that compiles source code, runs
CodeBuild tests, and produces software packages that are ready to deploy.
AWS Code
A fully managed source control service that hosts secure Git-based repositories.
Commit
AWS Code A fully managed continuous delivery service that helps you automate your
Pipeline release pipelines for fast and reliable application and infrastructure updates.
AWS A service that lets you run code without provisioning or managing servers. You
Lambda pay only for the compute time you consume.
Amazon Simple Amazon SNS is a fully managed messaging service for both application-to-
Notification application (A2A) and application-to-person (A2P) communication.
Service
Amazon Amazon S3 is storage for the internet. You can use Amazon S3 to store and
S3 retrieve any amount of data at any time, from anywhere on the web.
AWS Systems Parameter Store provides secure, hierarchical storage for configuration data
Manager management and secrets management.
Parameter Store
Chapter 1
Chapter 2
Chapter 5 Chapter 3
Chapter 4
Chapter 7
Chapter 8
Listed below is the open-source scanning tools available in AWS that are integrated in the pipeline. You could
also opt for different tools based on your business requirements. For example, most businesses use the static
code review tool Amazon CodeGuru for static analysis.
OWASP ZAP (DAST) Anchore (SCA and SAST) Sysdig Falco (RASP)
Chapter 1
Chapter 2
Chapter 6 Chapter 3
Chapter 4
Chapter 7
Chapter 8
AWS’ security, identity, and compliance services are categorized based on 4 function types:
Each of these functions has at least 2-3 AWS tools that may suit your business requirements.
Authorization
Enforcement
Chapter 1
Chapter 2
Chapter 7 Chapter 3
Chapter 4
Architecture Chapter 6
Chapter 7
Chapter 8
The following diagram represents the DevSecOps reference architecture on AWS that covers the aforementioned
practices, services, and support tools.
Build
Test (Secrets) Test (SCA, SAST) Deploy Test (DAST) Deploy (PRD)
Deploy
Listed below is the chronological sequence of 10. During the pipeline run, CloudWatch Events
events that are carried out on your AWS cloud. records the build state changes and sends
out email notifications to all the subscribers
1. When a user writes the code to a CodeCommit through SNS notifications.
repository, a CloudWatch event is generated,
triggering a CodePipeline. 11. CloudTrail tracks the API calls and sends
notifications on critical events happening on
2. CodeBuild packages it and sends the artifacts the pipeline.
to an S3 bucket. It retrieves the authentication
data from the Parameter Store to kickstart the 12. Finally, AWS Config keeps track of all the
scanning. As a best practice, we advise you configuration changes of AWS services.
to use AWS CodeArtifact to store the artifacts.
Security in the pipeline is implemented by using
3. While CodeBuild scans the code with an SCA IAM roles and S3 bucket policies with SCA, SAST,
tool (OWASP Dependency-Check) and SAST and DAST security checks.
tool, you can pick one of these during the
deployment. As a best practice, encryptions must be enabled
for code and artifacts, irrespective of whether at
4. If there are any vulnerabilities found from these rest or transit.
tools, CodeBuild invokes the Lambda function.
The Lambda function converts the results into
AWS Security Finding Format (ASFF) and
posts them on Security Hub. Security Hub
aggregates the findings in a single repository
and the Lambda function also uploads the
same into an S3 bucket.
Chapter 1
Chapter 2
Chapter 3
Chapter 8 Chapter 4
Chapter 5
Conclusion
Chapter 6
Chapter 7
Chapter 8
DevOps is a commendable approach if you are cyber-attacks and ticket resolutions when you
looking to improve software engineering and have DevSecOps in the fore?
maintenance processes. However, companies can
only achieve maximum advantage if security is Schedule a free consultation with our experts to
integrated into your DevOps practices. get started.
Organizations that have implemented DevSecOps Watch our latest webinar to know how integrating
have enjoyed enhanced automation throughout security into your DevOps framework tightens
the software delivery pipeline, thereby eliminating your AWS Cloud security. Adopting DevSecOps
cyber-attacks and ensuring pro-active security. will help your security teams focus on other value-
added activities.
So, why engross your cloud security teams with
About
Aspire Systems
• Global technology services firm with core DNA • Well Rounded Team covering Cloud Architects,
of Software Engineering Solution Experts & Application
• Specific areas of expertise around Software • Consultants
Engineering, Digital Services, • CMMI Maturity Level 3, ISO 9001:2015, and
• Testing, and Infrastructure & Application ISO 27001: 2013 certified
Support • International headquarters in Singapore with
• The vertical focus among Independent presence across US, Mexico, UK,
Software Vendors, Retail, Distribution & • The Netherlands, Poland, Middle East, and
• Consumer Products and BFSI India
• 3000+ employees; 150+ active customers • Recognized 11 consecutive times as “Best
• Oracle Global Platinum Partnership with OCI & Place to Work for” by GPW Institute
R12.2.9, Domain Expertise
Contact Us
For more info contact: [email protected] or visit www.aspiresys.com