DevSecOps VF
DevSecOps VF
your SDLC
with DevSecOps
A phase-by- 03
Introduction
phase guide 05
DevSecOps at every phase
of the SDLC
WRITTEN BY:
19
What’s next
Chas Clawson Colin Fallwell
Field CTO, Security Field CTO, Observability
Sumo Logic Sumo Logic
02
INTRODUCTION: Driving the adoption of DevSecOps is the need for teams to
maintain innovation at speed and establish a competitive
DevSecOps
differentiation that maintains and accelerates market share.
In the past security was often pushed to the end of the software
development life cycle (SDLC). As hacks have become more
is a term
prevalent, more costly, and more difficult to detect, security has
become of top-line importance to teams.
that’s grown in a day — and do it safely and securely — DevSecOps is the path
that gets you there.
in usage and
popularity.
15%
as an afterthought.
They have a security-first, security-always approach and
integrate and prioritize security and observability at every step
of the SDLC. They embrace DevSecOps practices everywhere
of dev teams can
from developer laptops to pushing code into production — and
be considered
everything in between.
“elite”
In this guide, we’ll take a look at tactical steps you can take at
each phase of the SDLC to help transform your team into an elite
DevSecOps performer. Elite team performance
DevSecOps SOFTWARE
DEVELOPMENT
→ Lead time
of the SDLC
SOFTWARE
DEPLOYMENT
→ Change fail
Time to restore
SERVICE
OPERATION
→ Reliability
Defining the upper and lower bounds for Logging format and verbosity
critical metrics
A standardized logging format across the enterprise reduces
Golden Signals or any other metrics used to observe a system
churn. Define the metadata to include in the log message.
should have upper and lower specification limits that define
Invest time gathering input from stakeholders. Logged
a performance corridor that conveys normal operation. The
attributes directly impact the quality of dimensional analysis
metrics defined should answer common operational questions
in the automated machine learning (AutoML) that identifies
like “How does our environment behave during peak
root cause when canaries fall off their perches.
utilization?” “Can we identify the point when we need to
scale?” and “Do I have the telemetry to detect anomalous
behavior or malicious use of services?” Answering these
Open-source tooling decisions
questions in the spec makes it clear when you’re no longer Open-source software has become a foundation of
meeting the agreement between all stakeholders and when observability. Tools like Prometheus, Grafana, and Jaeger
security threats might unfold. create a common platform to share information
across multiple teams. Commercial solutions are exclusive
This is the basis for reliability management during the and proprietary, limiting what development teams can do
later phases of the SDLC. Your metrics should become the and ensuring vendor lock-in. In a culture of continuous
‘canaries in the coal-mine’, signaling with confidence when improvement owning the code and libraries to build
action is warranted. It is also critically important to observability is a necessity.
accomplish this with the least number of metrics possible.
data
cause of “why” that issue occurred. Log data is often the most
detailed information available about a company’s systems, so it
makes sense to put that data to work, pulling log files across the
organization into a single analytics platform for end-to-end visibility
and faster troubleshooting.
→
There are many approaches and overflows, and other well-known vulnerability catego-
ries. While not perfect, the outputs from SAST tooling
tools to making code secure — some provide data points that inform the overall health of
language-specific, some industry- the code base.
management For example, you’ll need to consider how you’ll measure your
service level indicators (SLIs) against your service level objectives
(SLOs) and how your error budget informs how you prioritize work.
Exceeding your error budget will trigger more work to bring it back
→
building
practices you can implement:
phase
container images is reliably reproducible and verifiable.
Logic, which can detect anomalous phase will inform what the next cycle of the SDLC looks like.
Burning through your error budget here will indicate that
container activity, such as a the next development cycle requires a focus on bug fixing
misbehaving container reading a and stability whereas a surplus of error budget could mean
there’s more room for innovation. Ultimately, the goal of the
sensitive file on the filesystem. reliability management framework is to balance the speed
of innovation with serving your customers.
This activity triggers a security alert rule that notifies your
security team, who might trace the deployment back to a git
commit with a configuration not captured by the test suite or
QA team. The security team can then notify the development
team to get a fix and gauge whether a deployment rollback is
necessary. The team can decide whether to wait for the fix to
deploy, basing their judgment on the captured build time and
deployment time metrics.
We’ve looked at the phases, tooling, and processes that It’s designed to work with all of the tools you already use and
embody the spirit of DevSecOps and how they can enable an provides additional utility such as the Sumo Logic OpenTelemetry
SDLC that results in quick and secure innovation. DevSecOps Distribution to collect your data in a non-proprietary manner and
comes down to integrating security and observability culture, deliver real-time insights.
processes and capabilities throughout your SDLC. By shifting
security and observability concerns to your entire team — and at Visit Sumo Logic to learn more about how our SaaS analytics
every step—your application will be more robust, cost-effective platform helps global industry leaders deliver reliable and secure
and secure. digital experiences.
©️ Copyright 2023 Sumo Logic, Inc. Sumo Logic is a trademark or registered trademark of Sumo Logic in the United States and in
foreign countries. All other company and product names may be trademarks or registered trademarks of their respective owners.