DevSecOps Report
DevSecOps Report
DEVSECOPS
INSIGHTS
REPORT
2020
The drive to transform
securit y from gatekeeper
to business-enabler in the
world of fast digital
If you only have 5 minutes…
The information contained in this document is proprietary. ©2020 Capgemini Invent. All rights reserved.
2
Capgemini Invent – Future of Technology
3
1
DE VSECOPS IS A BUSINE SS
CHALLENGE
In today’s world, pace is everything for businesses to maintain a competitive
advantage. New ways of using technology to bank, travel, shop and consume
media – to name a few – have businesses turning their attention to faster
ways of innovating and responding to customer needs. The role of security
is to enable organisations to achieve this objective in an agile and secure
manner.
4
Capgemini Invent – Future of Technology
In the traditional world of securing software and system For businesses, this may mean choosing – perhaps unwittingly
development, security teams validate the integrity and – between keeping pace with customer requirements at the
compliance of software and systems at the end of each expense of greater vulnerabilities, and securing products at
sequential phase in the development lifecycle. This includes the expense of high development costs and a lack of speed
final sign-offs and audit trails. As organisations undergo agile to market.
transformation and increasingly adopt DevOps techniques
to thrive in this digital economy, such ‘gated’ security To prevent that from happening, security needs to adopt
assessments have become outdated, and do not fit the Agile a new strategic model ‘Educate, Automate, Monitor’–
model of continuous lifecycle iterations or DevOps approach to educate the workforce, automate security checks,
to removing team siloes. and monitor the IT estate so that security becomes
everyone’s responsibility.
In our ongoing work across a number of clients and does not. This causes delays in delivering new customer
industries, we often see widespread educational and features and increased tension between the teams.
cultural issues which end up creating a ‘tug-of-war’ situation
between security and agile product delivery teams. A lack of education causes reluctance to embrace
new and open source technology.
A legacy security mindset creates tension between
teams and destroys value. With limited security experience within delivery teams, and
limited experience of new DevSecOps technologies within
Often, security teams operate in isolation from the rest security teams, security teams are also often reluctant
of the business who are trying to embrace agile ways of to allow delivery teams to use certain technologies,
working but not taking on security responsibilities. This particularly if they are open source and not from a list of
legacy mindset manifests itself in requiring delivery teams approved services and technologies. In our experience,
to complete heavy sets of compliance documentation this list is not updated regularly, or by somebody with a
whenever the design of an application is changed. As good understanding of cloud or related technologies. This
product teams adopt more contemporary architectures (i.e. means delivery teams can often miss out on opportunities
serverless and microservices), the design often changes, to use the latest technology that would ultimately benefit
but the requirement to complete the same documentation the user and organisation.
5
2
6
Capgemini Invent – Future of Technology
1.
Available online: capgemini.com/gb-en/service/cybersecurity-services/devsecops-security-in-fast-digital/
7
Revamping the security operating model in itself is a change programme with associated risks, and is often unfamiliar
territory for CISOs. The key areas where change will need to occur include:
Before After
UX & Service
Scrum Master
Monitor
Designer
Digital Business Digital Business
Analyst Analyst
Full Stack
Engineer
UX & Service UX & Service
Designer
The most critical thing that security teams need to change is DevOps
Engineer
Designer
Security needs are now too vast and complex for experts
alone to be effective. Security needs to be a team of
evangelists who coach and communicate effectively with
the business and IT to enable shared responsibility for
security. This was never a key skill required from a security
expert previously. Likewise, developers, architects and ops
engineers now need to incorporate security best practice into
everything they do, as the security frontline.
8
Capgemini Invent – Future of Technology
2. Automate security to help IT and the 3. Monitor exceptions rather than police
business achieve their agility goal non-compliance
There are huge opportunities to automate processes and Compliance to static standards does not mean security –
shift work away from the security team to those working rules and regulations always lag behind innovative attackers.
directly in the software integration/delivery pipeline. Even Instead of periodically checking compliance, actively
security artefacts that cannot be automated should be made monitoring data flows across applications for exceptions
available for fluid self-service, e.g. security requirements can identify actual or potential attacks, vulnerabilities and
catalogues and example attacker stories. instances of secure policy or build breaches. Analysing root
causes allows organisations to fix weaknesses in their security
At a global defence company, Capgemini managed the
models. Application engineers should be included when
modernisation of its application estate as part of a cloud
baselining monitoring, since they know what data is captured,
migration programme. Penetration testing was required
where it is stored and what activity is normal.
for all applications before go live, negatively impacting
time and budget. Working with the development and test For example, below is a threat modelling exercise for a
teams to select the relevant security framework, Capgemini pothole detecting application:
configured static code analysis security rules in Visual
Studio – an application where developers write code – so
that vulnerabilities could instead be spotted during each
sprint and fixed before code was moved to the next stage,
removing future hindrances to IT development and the
business it supports.
Other
organisations
Premium data
(unknown)
2 Automatically detected
when car is moving Database held
by the start-up
Local
Data Potholes data council 1
1 User register
Potholes Data
detection app
detected
Figure 5 Instead of ensuring compliance, security teams need to collaborate with application developers on where anomalies could be
9
Client Insights: A Big six energy supplier and an
international car manufacturer shared similar underlying
challenges when ‘shifting security to the left’
We have helped many organisations in embedding security 2. Security is not an integral part of the agile product
in their agile development. A Big six energy supplier was team
accelerating its DevSecOps capability after its initial
focus on Internet of Things agile development had taken In both organisations, there is reluctance amongst
off; while an international car manufacturer needed developers, software architects and project
to uplift its security capability as the business moved stakeholders to embed security professionals within
into car financing and embarked on an ambitious cloud their teams and apply their recommendations.
journey. Two organisations, seemingly in two different Security is still synonymous with delays and additional
sectors, have revealed key factors that trigger resistance work—for example, security may not approve a
to embedding security in the design and build phase of specific user authentication mechanism and insist
software development. on a total re-design rather than simple rectifications.
Often developers end up having additional work
1. Business knowledge gaps in security teams while security professionals are not able to align the
rationale to the agile ways of working and termino
Both organisations found disconnects between
security professionals and the business processes, or 3. Simplicity requires initial complexity
products, they were applying their expertise to. Most
systems today have complex interconnected logical, Tool automation simplifies and accelerates design
procedural, data and technical touchpoints. Only processes, but it also causes discomfort to the delivery
with a holistic understanding of these can security team when adopting it for the first time – even though in
professionals identify and prioritise the spectrum of both cases the clients were operating digital businesses.
vulnerabilities, threat vectors, risks and mitigation Teams need a significant amount of time to identify the
controls needed. This requires rethinking the skill capabilities of each available tool and tailor it for optimised
of the security professional, as well as assistance application to their agile development and business risks.
from the business and product team to create a joint Not all companies have the structure and spirit of ‘early
businesstechnology- security picture. adopters’ who are willing to take on the challenge and
time required for this before tools are used on a large
scale within the organisation.
10
Capgemini Invent – Future of Technology
70
microservice, which provided clear responsibility lines for
60 maintaining features within the microservice environments.
50
40
30
20
10
0
Cloud-enabled non cloud-enabled
Organisations Organisations
11
The Opportunity: Take a ‘lab approach’
to leverage your DevOps to embed
security at the outset, and prove the
DevSecOps business case
During the last wave of agile transformation, organisations
can opt for a ‘lab approach’ in which a Cloud or DevOps
team is set up separately from the rest of the organisation
to serve as a ‘centre of excellence’ until its capabilities
and processes are ready to roll out to the rest of the
organisation. A similar approach could be taken to step up
the Agile or DevOps capability to incorporate security at the
outset – either leveraging the existing centre of excellence
or setting up a separate ‘lab’. In this way it is also possible to
implement and maximise the value of cloud agility.
12
Capgemini Invent – Future of Technology
Public Sector
Other
Technology
Manufacturing
Energy & Utilities
Consumer Products & Retail
Financial Services
13
The Opportunity: Be strategic with
cybersecurity investment and make use
of open source resources
This lack of correlation between cybersecurity spend
and DevSecOps maturity does not mean tools should
be abandoned altogether. With the rise of open source
technologies and frameworks, organisations unable to
afford expensive enterprise tools can still secure the core
touchpoints of their SDLC – as outlined in Part 3 – for very
little cost. “Examples of these are mapped to each of Seven
Security Touchpoints:”
Security
shifts
Design Build Test Deplpy Monitor
left and starts
here
Attacker stories Agile risk analysis 4 Agile risk analysis 7 Continuous security
improvement
14
The below perform the same job as their licensed counterparts. Whilst they may not have on-demand customer service
helpdesks, sleek user interfaces or enterprise-grade features, they offer the chance to implement security practices without
licence or purchase costs.
15
Capgemini Invent – Future of Technology
DESIGNING SECURIT Y
S E R V I C E S T H AT T H E
BUSINE SS WANTS TO USE
Every organisation’s culture and SDLC is different, so there is no ‘one-size fits
all’ approach to transform security within DevOps to enable greater business
agility. However, our experience has shown that to succeed in DevSecOps,
to treat it as a business challenge, and to address the three key challenges
highlighted in our survey, you need to put the human at the centre of all
activities, and design processes that reduce security frictions. At Capgemini
we therefore recommend taking a holistic Design Thinking approach to
understand product teams’ pain points in the context of Seven Security
Touchpoints along the SDLC.
16
In software development, there are Seven Key Touchpoints where security can be embedded, which is where organisations
must focus their security efforts to bring the ‘Sec’ into DevOps. These touchpoints are:
Security
shifts
Design Build Test Deploy Monitor
left and starts
here
Attacker stories Agile risk analysis 4 Agile risk analysis 7 Continuous security
improvement
Senior management should ensure that product teams Software should be built securely by design. This means
are provided with an action plan for designing and applying the aforementioned culture, attacker stories,
implementing security policies, controls and education blueprints and frameworks to software design. Code
into the organisation (blueprints) as well as documented reviews, unit testing and dynamic testing should be
information security management policies, procedures targeted according to the attacker stories during design.
and guidance (framework). A set of go-to ‘attacker When this is missed, product teams either don’t consider
stories’ should be considered to support developers’ misuse cases at all, or perform generic testing that creates
user stories by reflecting what malicious actors could do unnecessary work, e.g. to spot false positive alerts from
to compromise product or feature security. When this is automated testing tools. Eventually developers may
missed, the application is often developed in the ‘style’ of bypass automated tools.
the developer, making anomaly detection very challenging.
.
4. Agile risk analysis
2. Culture, collaboration and education
In Agile development, testing occurs continuously,
The mindset, processes, tools, knowledge-sharing and hence risk analysis must also be agile and continuous to
agile relationship between the business, development incorporate test results. Often security teams still use
and IT operations teams needs to enable fast and either a governance tool that is not fit-for-purpose, or
secure software creation, delivery and maintenance. a rigid Excel spreadsheet that quickly escalates out of
Training is provided based on individual roles in the version control. Automated, iterative risk management
organisation and security champions are embedded methodologies and tools, e.g. real-time key risk indicators
into delivery teams. Responsibility for security is shared and Agile risk trees, can improve agility. When this is
beyond the traditional security team. When this is missed or implemented incorrectly, product and security
missed, organisations often see an escalation of tension teams are not able to analyse and capture risk assessments
among teams. from workshops, nor reiterate risk levels in sufficient time
to accommodate new features.
17
Capgemini Invent – Future of Technology
An automated build and test pipeline – including dynamic Metrics should be identified and used to track
and static application security testing, functional testing improvements and lessons learned from security
and unit testing – should be created based on risk. The incidents, as well as to feed back into the design process
type and extent of testing scenarios should consider and demonstrate the value of DevSecOps. Bug bounty
attacker stories and risk priority. Relevant processes and programmes and Red/Purple teams – who test and
tools based on factors like programming language should enhance security effectiveness using attacker techniques –
be used, and the testing strategy should outline what is are also useful methods to identify areas of improvement.
tested manually or automatically. When this is missed, When this is missed, resources are wasted and teams
product teams can under-test or be overwhelmed with frustrated by repeated mistakes.
false positive alerts.
6. Risk-based monitoring
18
Design Thinking helps uncover pain In the context of DevSecOps, a user may take on the form of
anyone involved in the development of software applications
points in your existing security (e.g. developer, product owner, architect). The service
provider would therefore be anyone who is providing a
processes security service to that user (e.g. central security function).
Mapping out how the user interacts with your security service
Design Thinking is a human-centred and iterative approach in the form of user journeys will enable you to develop a
to creating services that meet the needs of the business, deep understanding of what your user is feeling and where
users and other stakeholders. This approach ensures that the they are encountering friction. Gaining this empathy can help
right problem is being addressed first before committing to a you more clearly articulate the problems in transforming
solution, whether it be technology or process-based. to a DevSecOps way of working, which you can then more
easily resolve using new operating principles and security
touchpoints along the SDLC.
Olivia Blake, Procurement Line Manager, Business Area 1
Olivia has worked as a line manager for 5 years and has a team of 30 people split across two teams. Each team uses 10 apps monthly to perform their tasks.
Recently, her team has seen a change in personnel due to sick leave, re-organisation, new joiners and promotions.
# Pain point R O U
Group Journey touch point
E E
1. Having multiple systems to request access leads to an increase in the 4 4
time needed to submit all requests and this causes frustration when End user 13
trying to remember the process for each system
6 6
13 14 16
Pain points
2. Frustration over the repetitive information input, thus slowing down the Request system
request process
Touch points
8 8 8
3. Accessibility and accuracy of approver details, which leads to frustration Third party 10
of finding the approver information every time and having a wrong vendor
person approving access
10 10 Physical access 7
4. Third party vendor requests are managed locally by the business which team
leads to a lack of an audit trail and can increase the risk of granting
unnecessary access 14 14 HR 1
5. There is not sufficient reasoning for the closure of the ticket, thus the
LM has to contact the helpline to clarify the reason and re-submit the 17 17
request (no option to amend), thus slowing down the process
19
Capgemini Invent – Future of Technology
Key takeaways
DevSecOps is a business challenge. Many organisations We combine our expertise in strategy, operating
have undertaken a fundamental shift in their operating models, change management and benefits realisation
model from one designed for functional efficiency to with technical expertise in Cybersecurity to help our
one designed for agility. The role of security is to enable clients succeed in today’s digital world. For more
organisations to achieve this objective in an agile and guidance or content related to DevSecOps, and
secure manner. We believe that using a human-centric information on how to get in touch, please visit our
Design Thinking approach is the best way to create website.
frictionless security services that the business wants to
use. Our two frameworks help in distilling complexities
to manageable actions: at a strategic level through
Educate, Automate, Monitor (EAM) principles; and at an
operational level through Seven Security Touchpoints at
the Software Development Lifecycle (SDLC).
20
For more information about Capgemini and our offer to support organisational
transformation towards DevSecOps, please reach out to our key contacts below.
GLOBAL
Benjamin Alleau
benjamin.alleau@capgemini.com
NORTH AMERICA
NORTH AMERICA
Jace Cole
jace.cole@capgemini.com
EUROPE
FRANCE UK DACH
Arnaud Balssa Sandeep Kumar Nora Preisker
arnaud.balssa@capgemini.com sandeep.j.kumar@capgemini.com nora.preisker@capgemini.com
SPAIN
Mario Camarero
mario.camarero@capgemini.com
ASIA PACIFIC
INDIA SOUTH EAST ASIA AUSTRALIA
Nidhi Grover Kaustav Roy Stephan Taitz
nidhi.grover@capgemini.com kaustav.x.roy@capgemini.com stephan.taitz@capgemini.com
We would like to thank the following subject matter experts for their contribution to this report:
Charli Douglas, Dan Harrison, Holger Kuprian, Dion Alexopoulos , Kay Ng
21
APPENDIX
Research methodology and survey respondents
This report is based on the information collected from 96 respondents to the DevSecOps Security Assessment between 2018
and 2019. The participants cover a wide range of industries, geographies and roles that have helped gather a representative
sample to provide meaningful and accurate insights.
Energy &
Utilities, 5%
France 11%
Figure 2 The majority of respondents were based in the UK
22
Capgemini Invent – Future of Technology
Technology 41%
23
ABOUT
CAPGEMINI INVENT
As the digital innovation, consulting and transformation brand of the
Capgemini Group, Capgemini Invent helps CxOs envision and build
what’s next for their organisations. Located in more than 30 offices
and 22 creative studios around the world, its 6,000+ strong team
combines strategy, technology, data science and creative design
with deep industry expertise and insights, to develop the new digital
solutions and business models of the future.
Visit us at
www.capgemini.com/invent