DevSecOps Best Practices Guide Final Version 1.0 January 2020 This document was prepared for authorized distribution only. It has not been approved for public release. Final Record of Changes Record of Changes Version Date Author / Owner Description of Change 1.0 January 2020 MITRE Initial Draft 1.0 January 26, 2020 MITRE Initial Version CR # CR: Change Request DevSecOps Best Practices Guide Version 1.0 ii January 2020 Final Executive Summary Executive Summary Application development programs leverage Agile and DevOps software development methodologies to support the continuous integration and continuous delivery required for their business solutions. At the same time, systems continue to be a primary target for bad actors due to the sensitive nature of mission data. DevSecOps accelerates delivery by automating the required security and privacy processes for threat modeling, generating security and privacy documentation artifacts, change and source control management, static and dynamic code analysis, infrastructure hardening and least functionality checks. This document describes proposed best practices (e.g., standards, processes, and technologies) to ensure that trusted applications and solutions are securely developed and continuously delivered to end users. DevSecOps Best Practices include: • Security Validation as Code – Testing standards, testing content (code), and automation tools to effectively know “is it secure?” • Documentation as Code – Testing standards, testing content (code), and automation tools to effectively know “how am I secure?” to help maintain System Security Plan (SSP) documentation. • Change Management Auditing – Processes to foresee significant security testing changes in a Sprint (Security Impact Analysis), and pipeline auditing to track unauthorized changes during builds. Answers the question: “what changed?” • Reporting – Reporting and integration requirements to comply with stakeholder use of security data from the DevSecOps lifecycle. Stakeholders include developers, Information System Security Officers (ISSOs), Security Assessors, security operations center staff, and Federal Information Security Modernization Act (FISMA) reporting teams. • Operational Analytics – Best practice process to engineer application audit log triggers during development to detect anomalies during operations and use this data to adapt to and plan for the next application development Sprint. • DevSecOps Process Improvement – Describes what to measure and how to analyze the data to constantly improve the project’s DevSecOps process. Improve future builds using metrics and measures of security debt, unauthorized changes during development, and detection of anomalies during operation. DevSecOps Best Practices Guide Version 1.0 iii January 2020 Final Table of Contents Table of Contents 1. Introduction .............................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 Background .................................................................................................................. 1 Purpose ........................................................................................................................ 1 Scope ........................................................................................................................... 2 Audience ...................................................................................................................... 2 Document Organization/Approach ............................................................................... 2 2. Goals and Objectives ................................................................................................ 3 2.1 2.2 Benefits of DevSecOps ................................................................................................ 3 Constraints ................................................................................................................... 3 3. Exemplar DevSecOps ............................................................................................... 4 3.1 3.2 3.3 3.4 3.5 Top Qualities of DevOps .............................................................................................. 4 Top Qualities of an Exemplar DevSecOps Framework ................................................. 5 Value of Building Security into DevOps ..............................................

pdf文档 MITRE DevSecOps Best Practices Guide 2020 英文版

文档预览
中文文档 44 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共44页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
MITRE DevSecOps Best Practices Guide 2020 英文版 第 1 页 MITRE DevSecOps Best Practices Guide 2020 英文版 第 2 页 MITRE DevSecOps Best Practices Guide 2020 英文版 第 3 页
下载文档到电脑,方便使用
本文档由 路人甲2022-08-16 03:25:43上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言