SRE
Service Reliability Engineer (SRE): Primarily responsible for improving the
reliability of services through collaboration with development, proactive
monitoring, and optimization of redundancies in operations. SRE is an integral
part of modern cloud development teams who are involved in proactive testing,
observability, service reliability, and speed
Shift left security – from DevOps to DevSecOps
With a move from just a few releases a year to weekly feature releases, security can no longer be ensured
manually. Security needs to be part of the DevOps pipeline and be automated. There are plenty of
security tools out there from various vendors than can integrate with the pipeline. The key things to
be addressed in a DevSecOps pipeline include security tools that address the following.
Securing cloud-native development and operations
Securing the DevOps pipeline involves catching security errors early in the cycle and addressing the
vulnerabilities of deployable artifacts, as well as performing configuration checks. These aspects are
discussed in the following sections.
Helping developers address issues in the code early
A proper Integrated Development Environment (IDE) should come with source code analysis and
code coverage tools that analyze the source code to find security flaws. The usage of security testing
tools for identifying potential vulnerabilities (such as OWASP) is a critical element of DevSecOps.
There are several open source and vendor tools to that integrate with your pipeline that can secure
your application before you deploy to production and ensure they are vulnerability free.
Information
The Open Web Application Security Project® (OWASP) is a non-profit foundation that works
to improve the security of software. The OWASP Top 10 is a book or referential document
outlining the 10 most critical security concerns for web application security.
Securing deployable artefacts
Artifacts such as containers and third-party libraries need to be scanned for vulnerabilities. The cloud
service providers and repository engines typically provide built-in security scanning for these artifacts.
In the container space, you will see a lot of open source tools (among others) available that provide
security for your end-to-end CI/CD pipeline. These tools can also benchmark your security against
standards and best practices such as CIS security standards.
Security Orchestration, Automation, and Response (SOAR) is a core part of automation – identifying
the risks, integrating the data that needs to be monitored, detecting the key event of interest, and being
able to respond to it.
Zero-trust architecture and security models
traditional perimeter-based protection with firewalls is
changed to context-based access.
you don’t trust anything – people, processes, technology, networks,
computes, or storage – until it proves that it is trustable.
Some of the capabilities you need to build a
security system based on zero trust are adaptive identity, context-specific and policy-enforced data
security, policy-driven access control, and secured zones
Comments
Post a Comment