How to Get Developer and Security Teams Aligned - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
DevOps
Commentary
5/28/2021
07:00 AM
Ariel Assaraf, CEO, Coralogix
Ariel Assaraf, CEO, Coralogix
Commentary
50%
50%

How to Get Developer and Security Teams Aligned

Aligning developer and security teams can help improve security posture, and in most cases, it can be achieved without adding additional tooling.

Credit: REDPIXEL via Adobe Stock
Credit: REDPIXEL via Adobe Stock

It’s impossible to ignore security in the tech industry. LinkedIn, Google Ads, and now even Instagram are all touting their own security tools, methodologies, and consultancy services.

Why then, with there being such a buzz around security, is it a practice so difficult to entrench in a developer’s head? A consultancy or vendor might have you believe that you need to fork over some cash (i.e. buy their tool, service, etc.) in order to get developers and security aligned.

However, the solution might be something you can already achieve within your organization -- without adding any additional tools to your stack.

Culture is Everything

DevSecOps is big, and it’s here to stay. You might think that it’s as simple as Dev + Sec + Ops, but it’s more than that.

With DevSecOps, the ‘Sec’ should be thought of more as an all-permeating wrapper rather than just another component. (Dev+Ops)Sec would be more accurate. Effective DevSecOps ingrains security at every stage of the pipeline, from build to deployment.

Potential solutions such as container-level security or GitOps or infrastructure-as-code are not a simple Band-Aid, they require a culture shift.

If you’ve already built a security-conscious technical team, and you know your pipelines and processes inside and out, then implementing DevSecOps simply shifts security left in the workflow.

Policies Over Standards

The concept of policies replacing security standards builds on the idea of culture shifts. Security standards are typically just a piece of documentation saved on Confluence or GSuite somewhere. They may get examined by a developer during a mandatory annual training session, or occasionally for reference, but they aren’t dynamic and are rarely top of mind.

Those responsible for enforcing such standards are normally compliance or security operations specialists, who are logically distanced from developers.

Aside from low adoption rates and disruptions to Agile workflows, security standards often lead to the ‘enforcer’ becoming the bad guy. This pushes even more of a wedge between dev and security, making security feel a bit like doing your taxes (and no one wants that).

If the expertise of the traditional ‘enforcer’ is shared with developers and dynamic, adaptable policies are adopted in place of rigid standards, then security simply becomes part of the workflow.

Zero-trust networking is a great example of this. Zero-trust networking is probably the best way to secure your infrastructure, and it relies on expertly defined and managed policies being present through each of its 10 principles.

Communication is Key

It’s common knowledge that communication is important in any successful relationship.

Communication between development and security teams should be free-flowing, transparent, and where possible, automated. Organizations with a successful DevSecOps culture take steps to improve collaboration and transparency such as only allowing communication via channel or group message.

Shared Lessons Learned From Mistakes

Google recently published some top lessons learned since establishing their Customer Reliability Engineering team including the importance of knowing how to communicate about risk.

To mitigate negative outcomes, their CRE teams designed a risk matrix to constantly evaluate, communicate, and address current and foreseen risks. This sort of exercise wouldn’t be successful if carried out by developers in isolation. By bringing security into the mix, you can be assured that the risks are properly addressed.

Full System Observability

If you’re on a mission to align your security and development teams, culture and communication is just the beginning. It’s vital to provide them with the tools and information needed to do so effectively.

We’re talking about true, system observability, not just whiteboards. Observability gives teams the power to know what’s going on at any given time in a system.

Start With the Basics

Observability is the evolution of monitoring, so the latter needs to be in place for the former to be successful. Relevant metrics need to be collected, retained for an appropriate period, and stored in an accessible way. Metrics can also feed into invaluable tools like SIEM dashboards, a vital part of the security toolkit.

Build Something Great

Observability provides cross-cutting analysis of both system health and security. With a truly observable system, you can visualize data from anywhere -- including marketing sources, network load balancers, Kubernetes clusters & more.

This gives you the real power to understand what impact each aspect of your system has on the organization as a whole. Perhaps most powerful of all is the clarity and actionability of the data in a truly observable system.

Aligned Responses in Real-Time

The context and analysis that observability platforms provide in real-time give your teams the ability to act quickly and with precision. In the event of a security breach, both your dev and security teams can be alerted with real insights and context, allowing them to collaborate effectively. Should you have a system outage, your devs can work on bringing things online while the security folks advise and reinforce policies to protect you at your most vulnerable.

Is it Really That Easy?

Observability is a crucial component of modern-day security. The more event data you have, the more observable your system is. Cross analysis of metrics relative to devs and security create transparency and mutual understanding in times of crisis.

Unfortunately, following these simple steps won’t magically align dev and security teams overnight. These are just the foundations you need to get the ball rolling towards building a symbiotic relationship.

Ariel Assaraf is CEO of Coralogix. A veteran of the Israeli intelligence elite, he founded Coralogix to change how people analyze their operation, application, infrastructure, and security data -- one log at a time.

 

The InformationWeek community brings together IT practitioners and industry experts with IT advice, education, and opinions. We strive to highlight technology executives and subject matter experts and use their knowledge and experiences to help our audience of IT ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
News
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
2021 State of ITOps and SecOps Report
2021 State of ITOps and SecOps Report
This new report from InformationWeek explores what we've learned over the past year, critical trends around ITOps and SecOps, and where leaders are focusing their time and efforts to support a growing digital economy. Download it today!
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll