Bringing DevOps Speed, Efficiencies and Benefits to Cybersecurity

My biggest take-away from over two decades in cybersecurity? The most elegant solution are ones that are simple to implement, have an element of automation and are easily incorporated into existing activities seamlessly. With digital innovation leading to accelerated and automated DevOps, one of the most important things we can do to reduce risk in the enterprise is to begin to incorporate cybersecurity into enterprise CI/CD pipelines. Now, as breach attack simulation and automated purple teaming becomes strategic to reducing risk and optimizing security controls in a continuous security validation fashion, these offensive testing techniques can be incorporated as well. For cybersecurity managers and business leaders, adoption of these solutions means they know what portions of their cybersecurity investment to keep and what to get rid of. Their spend is optimized. They can effectively measure, explain, and reduce cybersecurity risk. For cybersecurity practicians, when done right, these solutions allow you to optimize your security controls, your incident response processes, and train your personnel.

In adopting both technologies there are four key caveats in best practice adoption:

  1. Ability to utilize existing cyber workforce: With a large global shortage of highly skilled cybersecurity professionals the solution must be useable and accessible to a wide array of skill sets.
  2. Adopted in a continuous security validation manner: The platform must be updated daily, automatically, and capable of being run in a continuous security validation fashion.
  3. Actionable intelligence updated constantly: Since threat actors change and evolve daily, there are inherent needs for these solutions to make new intelligence immediately actionable by adding new tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to the solution when discovered.
  4. Comprehensiveness: These solutions must be able to test in production safely using real workloads and real tests across all stages of the kill-chain. It needs to include reconnaissance checks of enterprise against darknet and Internet INT and OSINT. It must include phishing campaigns against the enterprise staff. Attacks must include pre-exploit and post exploit and be able to work across your entire environment from legacy premises, virtualized, cloud, SaaS, and containers.

Incorporating into the CI/CD Pipeline

The main tool of someone in DevOps is to utilize play books. Whether Chef Puppet or Ansible, these play books provide seamless integration automation allowing entire environments and thousands of servers to be implemented in a matter of a few mouse clicks. Cymulate’s well documented API set means the DevOps professional can easily create in a CI/CD pipeline image, spin it up, and test it against thousands of the most recent attack tactics, techniques, and procedures (TTPs) and indicators of compromise (IoCs). Based on the resulting rating, the DevOps professional can easily make a go/no go decision on whether that image becomes implemented into production or whether it returns to the development environment for increased tuning. The Cymulate solution, which ties into hundreds of security control solutions, not only provides prescriptive, easy to follow remediation advice on how to shore up security controls but executive summary reports as well.

For the article, Cybersecurity Researcher Michael Loffe and I ran an image build using Jenkins, the well-known, free, and open-source automation package. In Example Image 1 below, as part of the Jenkins build, we added an assessment to check against Cymulate’s Purple Team module being pulled up via REST API key looking for a 40% or better success rate percentage to give the build a passing grade.

Example Image 1

cymulate_Image_1.png

In the initial run we see the test image spun up and was tested against Cymulate’s Purple Team module. Looking at the Console Output, the score is greater than the 40% success rate threshold and the build received a failing grade and was returned for better tuning to be tested again. (See Example Image 2).

Example Image 2

cymulate_Image_2.png

This example is elegant, simple, and only adding 3.5 seconds to the build time — adoptable. By incorporation into any DevOps CI/CD pipeline we can add purple teaming tests that will result in tighter image and third-party security controls while keeping the speed and simplicity intact. Subsequent runs of the tests after controls were tightened show risk was ameliorated to an acceptable level and that the workload is pushed it to production. By accomplishing this we have incorporated purple teaming into the shift left, CI/CD pipeline. Digital innovation with all its speed and agility CAN be accomplished hand in hand with cybersecurity.

One of the newer players in the field Cymulate is already one of the largest. In a third-party comparison of vendors, Cymulate won Frost & Sullivan’s Best Practices in Global Breach and Attack Simulation scoring first in innovation and second in business expansion and market share.

For more Information, visit www.cymulate.com and register for a Free Trial.

Dave_Klein-cymulate.jpg

Dave Klein is the Director of Cyber Evangelism for Cymulate. With more than 21 years of real-world cybersecurity experience, he works with Cymulate teams, customers and industry thought leaders to address the challenges of securing modern enterprise environments. Dave’s long career includes working on the NIST response to President Obama’s Policy Directive 21 on Critical Infrastructure Security and Resilience, leading some of the largest sales engagements for US Federal security solutions, and working with the City of New York post 9/11, helping shore up defenses.

Note: This article have been indexed to our site. We do not claim ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Podcast: How games teach AI to learn for itself thumbnail

Podcast: How games teach AI to learn for itself

From chess to Jeopardy to e-sports, AI is increasingly beating humans at their own games. But that was never the ultimate goal. In this first episode of season three of In Machines We Trust, we dig into the symbiotic relationship between games and AI. We meet the big players in the space, and we take…
Read More
Claim: Bitcoin's price will reach 400 thousand dollars!  Here's why! thumbnail

Claim: Bitcoin's price will reach 400 thousand dollars! Here's why!

Quantum Fintech Group'un kurucusu ve yönetici ortağı Harry Yeh, mevcut kripto para trendlerinin, sektörün esas olarak stabilcoin'ler etrafındaki aktivite nedeniyle bir süper döngüye girdiğini gösterdiğini öne sürdü. İddia: Bitcoin'in fiyatı 400 bin dolara ulaşacak! İşte sebebi! Bloomberg Markets ile konuşan Quantum Fintech Group'un kurucusu ve yönetici ortağı Harry Yeh, kripto para piyasasının emekleme aşamasında olduğunu…
Read More
Peter Dinklage schimpft über “Schneewittchen” und die Fans von “Game of Thrones” thumbnail

Peter Dinklage schimpft über “Schneewittchen” und die Fans von “Game of Thrones”

Peter Dinklage hält mit seiner Meinung nicht hinter dem Berg. Vor Kurzem bekamen enttäuschte Fans seiner Hitserie "Game of Thrones" eine verbale Abreibung verpasst. Der Darsteller des kleinwüchsigen Tyrion Lannister tat die Kritik und die Enttäuschung vieler glühender Anhänger über die finale Staffel der HBO-Show im Gespräch mit der "New York Times" mit diesen Worten…
Read More
Biden Executive Order Bans Sale of US Data to China, Russia. Good Luck thumbnail

Biden Executive Order Bans Sale of US Data to China, Russia. Good Luck

US president Joe Biden will sign an executive order on Wednesday aimed at preventing a handful of countries, including China, North Korea, and Russia, from purchasing sensitive information about Americans through commercial data brokers in the United States.Administration officials say categories of sensitive data, including personal identifiers, precise location information, and biometrics—vital tools for waging
Read More
Exclusive: Leatherback denies losing funds to little-known SDQ Facilitators thumbnail

Exclusive: Leatherback denies losing funds to little-known SDQ Facilitators

Leatherback, a cross-border payments startup, is the subject of ongoing speculation within high-level online communities of the Nigerian tech ecosystem. The UK-based company, which raised $10 million pre-seed, is backed by ZedCrest Capital and provides cross-border payment services to customers in South Africa, Egypt, Uganda, India, the UAE, and Nigeria. An unsubstantiated report making the
Read More
Dying Light 2 offered a tasting of cooperation and playing on consoles thumbnail

Dying Light 2 offered a tasting of cooperation and playing on consoles

Včera večer se uskutečnila poslední epizoda z informačního cyklu Dying 2 Know, který nás má za úkol blíže seznámit s prvky očekávaného open-worldu – Dying Light 2 Stay Human. Ta byla dedikována všem fanouškům společnosti Techland i samotné značky, přičemž pokryla několik zbývajících střípků. To znamená, že jsme se dočkali ujištění, že titul nabídne kooperaci…
Read More
Index Of News
Total
0
Share