Behind the buzzword, is there a real need of and value for organizations in exploring DevSecOps? Itu2019s important to understand why DevSecOps matters in this day and age of security breaches and what the pragmatic benefits are for your organization. Credit: Dean Mitchell / Getty Images It’s right there in the moniker: DevSecOps , a portmanteau of Development, Security and Operations, implies introducing security early on – as a part of a comprehensive, agile Software Development Life Cycle (SDLC) used by your organization, rather than doing so iteratively or waiting until after a release. Given how security breaches and vulnerabilities have become everyday news, it makes little sense for developers to ignore the seriousness of secure coding anymore. Here’s a little secret though: developers are often not the most security-oriented folks for obvious reasons. It is not their primary duty. The priority for a software developer is to build an app, have it carry-out the intended tasks nicely and perhaps account for the overall user experience (UX) and satisfaction. If they are being diligent, they may incorporate basic ‘security checks’ as a part of their coding processes – such as not blindly trusting user input and sanitizing it, but beyond that, a developer may not alone have adequate bandwidth or expertise to incorporate the most superior security checks in an app. A moment of honesty: despite working in DevSecOps for Sonatype I did not understand upfront what the buzzword meant for quite some time. I often questioned myself, “where does the benefit lie for organizations in this? Is this all a marketing fad?” Over time, I have observed a trend and upward push in the industry to implement some sort of inherent ‘security’ as a part of their development workflow and here are the 5 benefits that immediately come to mind. 1. Spot vulnerabilities and bugs early on While a developer may do their due diligence with regards to implementing basic-level security checks, nobody can know in this vast open-source ecosystem with millions of repositories, as stated by GitHub, how many software packages contain a security vulnerability and in which of its versions. Provided the huge volume, it is just impossible to be aware of it without having some sort of security automation in place. The National Vulnerability Database (NVD), a U.S. NIST initiative, which by no means is a comprehensive or accurate list, just crossed their 100,000th vulnerability in 2018, with more vulnerabilities being added every day. This does not always include the “security exploits” and issues being posted on GitHub or ExploitDB. An integrated DevSecOps solution or workflow which supports some automation can help developers spot if they are unintentionally using any open-source libraries with known vulnerabilities, before they even begin coding the rest of the modules of a software project, only to realize they need to start over. 2. Leverage open source with increased confidence Since the open-source community traditionally has welcomed contributions from ‘anyone’, this also opens a door for abuse by malicious actors. In 2019, multiple reports of malware having been disguised as legitimate open-source packages came to light. While npm’s representatives were able to spot and “remove” these components from their servers, the process has not always been a quick one. An unsuspecting developer already using one of the compromised components would have no means of knowing this, unless an automated tool was in place to be able to constantly scan their project and point out any malicious open-source components. This is where IDE-integrated solutions can save the developers and an entire organization from blunder and embarrassment that may follow after making a release. 3. Save costs on resource management As a former software developer, I can authoritatively reflect on how “dependencies” pose a problem during software development and critically shape the rest of the workflow. In layman’s terms, if your application requires a certain library A which depends on yet another library B, which further depends on yet another library C, version 2 – which is vulnerable – it would naturally mean you can’t use any of those three libraries unless library A and B supported a non-vulnerable version 3 of library C…provided such a version even existed. You can see how this can get tedious. Imagine having to make this decision of accepting potential security risk for 20 or more components for a mid-to-large scale software project or exploring alternative open-source libraries. For project managers and devs, having this knowledge upfront and being able to assess the risk early on can mean being able to search for better alternatives and design secure software from the start, rather than waiting until after a release, when a vulnerability assessment may in future, reveal a critical vulnerability. In practice, this means saving tremendously on manhours and resource management costs. 4. Make developers security-aware Your developers are busy and tasked with implementing a certain functionality out of code for your users. Security may not always be their number one priority due to limitations imposed by meeting deadlines and even developer’s own lack of security expertise. However, with DevSecOps software solutions, the constant ‘reminders’ about excluding certain components from software builds, along with credible reasoning which warrants so, makes your developers a little more interested in and aware of security every time they see such an alert, for example. In the long run, this may habitually reinforce in the developer’s mindset of avoiding altogether an open-source component which has a reputation of containing security flaws in multiple versions. 5. Reduce risk and legal liability Organizations often state, “we take your security and privacy seriously,” but not many live by it. Had they did, the current climate of frequent cybersecurity breaches would be non-existent. Either way, any such damaging news severely impacts an organization’s brand reputation negatively and may lead to potential lawsuits and fines. Following security practices at every aspect of your software project – even when a simple website, is more likely to reduce such a risk and impact that may arise from having an otherwise complacent attitude towards security. In conclusion, there is never a way of knowing whether your application or project is totally secure from all directions: after all, we can’t claim to predict or rule out the unknown risks. But following best practices and automation as outlined by the fancy term DevSecOps can tremendously reduce your risk arising from using software components with known vulnerabilities, right from the beginning. Related content opinion 5 ways cybersecurity awareness trainings can strengthen your organization As efforts to implement comprehensive security engineering frameworks and policies grow across various enterprises, it makes sense to implement a hands-on training program focused on educating your employees with basic cybersecurity best practices u2 By Ax Sharma Nov 07, 2019 6 mins IT Skills Security opinion Is our obsession with regulation killing the web? What started out as an open, connected and vastly unregulated platform of sharing information is consistently being crippled by legislation made by people who do not understand the fundamentals of technology. Unless we act fast, there may be no way o By Ax Sharma Jul 02, 2019 10 mins Regulation Internet Privacy opinion 7 steps to landing your first IT job, fast When making big career moves, it's sometimes hard to know where to start or how to get tangible results. Whether you're on track to graduate or in the process of switching careers, these essential tips should help you land your first IT/cyb By Ax Sharma Mar 29, 2019 7 mins IT Skills Staff Management Careers opinion 7 ‘don’ts’ of diversity for fostering a healthy office culture A fair and inclusive workplace should cater to the needs of every employee as much as practically possible. However, diversity efforts and discussions often open up an unsavory can of worms. Fairness implies being fair and inclusive for everyone u201 By Ax Sharma Jan 14, 2019 11 mins Technology Industry Staff Management IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe