Skip to main content
banner image
venafi logo

How Does Zero Trust Impact DevSecOps? [Interview with Larry Maccherone, Part 3]

How Does Zero Trust Impact DevSecOps? [Interview with Larry Maccherone, Part 3]

zero trust in devsecops
February 26, 2020 | Guest Blogger: Helen Beal


In my last conversation with Larry Maccherone, the DevSecOps Transformation Senior Director at entertainment giant, Comcast, we spoke about his vision for the future of DevSecOps in 2020 and beyond. In this third and final conversation, we’ll cover zero trust and the impact that it may have on DevSecOps.
 

Helen: Today, many applications run in hybrid and multicloud environments where the perimeter is identity-based, not IP based. In this zero-trust model, how can security and engineering teams work together to scale issuance and monitoring of machine identities (e.g. SSL/TLS certificates) within policy?

 

Larry: Identity is a bigger problem in a containerized, microservices, and serverless world. You can't count on an IP address being the same anymore. And that's a good thing from an engineering perspective because you should think of machines as cattle, not pets.
 

But of course, that makes scaling the issuance and monitoring of machine identities such as SSL/TLS certificates harder. Although the attack surface is always changing since there are no longer static IP addresses, there are regulatory and other compliance requirements that teams must grapple with. To enable this at scale it’s important for security and engineering teams to work together to standardize their approach for certificates. Teams should strive towards standing up a service for certificates so that this infrastructure can be leveraged across many teams. This gives security teams a central point of control to set guardrails and monitor issuance while making things a lot easier for developers. Having a common framework also reduces complexity and minimizes dependencies on individual issuers by abstracting those details away from individual applications. This is great for security because it speeds up remediation efforts with little to no impact on the individual application or team supporting it. 
 

So rather than wait until the application gets into production, it’s good to have developers improve their process such that they're confident that the product that they're putting out there will use machine identities that are known to the security organization and compliant with policy. That prevents vulnerabilities from weak or misconfigured certificates and future headaches related to audits. You really have to embed this service in the CI/CD pipeline that builds the piece of cattle.

 

Helen: Are there any other models that would help with this?

 

Larry: Serverless. Serverless is really an even better model than containers. It's essentially really, really, really small containers with very little state preserved, and so that makes security a lot easier in one sense, but the DevSecOps tools market is being slow to catch up. There are more tools that deal well with containerization right now because it's been around a little longer than serverless.

 

Helen: Will DevSecOps last forever?

 

Larry: No, it's a marketing buzzword. I don't think of the spiral model and then XP and then RUP and then agile, and before Scrum there was a bunch of flavors of agile. I don't think of these as separate things, I really think of these as the world adapting to changes in technology.
 

The reason that a waterfall-ish approach was actually the right way to build software was that it was very expensive to pass backwards over certain boundaries in the process. For instance, once you shipped the product to the field, it required a human to go out to the factory to install an upgrade to the software. So you better make sure that it was in very good shape before it went out to the field, and that justified a three-month long testing period before you shipped a product out into the field.
 

So now it's essentially free to ship stuff to the field. Compiling used to take longer, testing used to take longer, all these things it used to take huge efforts that were very costly to redo. We've lowered the cost of those dramatically. The evolution of our process models is essentially just adapting to the evolution of the capability of our technology over time. And a little bit of the capability of our mindsets. Sometimes the only resistance is just a different way of thinking about things.
 

I don't think DevSecOps is a new thing; it's just one more thing on the progression. I see the phrase DevSecOps becoming buzzword bingo very quickly. I think DevOps will survive much longer. I think of DevSecOps as essentially; if you're doing DevOps right, you're doing DevSecOps. I don't have a different definition for those two things.
 

Trial Venafi as a Service and simplify PKI. Click Here.

 

Related posts

Like this blog? We think you will love this.
cloud cyber security, cloud security, zero trust security
Featured Blog

Why Zero Trust in the Cloud Requires On-demand Machine Identity Management

So, as machines are spun up in the cloud, we need to assign security parameters based on their p

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Guest Blogger: Helen Beal
Guest Blogger: Helen Beal

Helen Beal is a DevOps guru. She currently serves as a Member of the DevOps World Advisory Board, the DevOps Institute Board of Regents, and is listed in PowerAdmin's 51 DevOps Influencers to Start Following Today.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more