Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
DevSecOps Best Practices- Secure Everything You...
Search
Sena Yakut
April 21, 2024
0
200
DevSecOps Best Practices- Secure Everything You Have
Sena Yakut
April 21, 2024
Tweet
Share
More Decks by Sena Yakut
See All by Sena Yakut
AWS Cloud Security Fundamentals
senayakut
0
57
When Cloud Security Meets AI: A Playbook for the Future Leaders
senayakut
0
51
Oops, I Broke It Again - Practicing Safe Chaos in the Cloud
senayakut
0
52
Your AWS Account Got Hacked. What Happens Now?
senayakut
0
59
From Prompt to Prediction: Understanding LLM Outputs
senayakut
0
37
Thank U, Next... Prompt - Securing Generative AI Like a Queen
senayakut
0
67
Dangerous by Design Cloud Security Flaws We Keep Repeating
senayakut
0
370
re:Inforce 2025 - Serverless Threat Response for Amazon S3 Malware Detection
senayakut
0
76
Falling in Love with the Cloud – Securely
senayakut
0
88
Featured
See All Featured
YesSQL, Process and Tooling at Scale
rocio
174
15k
Understanding Cognitive Biases in Performance Measurement
bluesmoon
32
2.8k
Context Engineering - Making Every Token Count
addyosmani
9
740
Marketing to machines
jonoalderson
1
5k
Evolving SEO for Evolving Search Engines
ryanjones
0
150
RailsConf & Balkan Ruby 2019: The Past, Present, and Future of Rails at GitHub
eileencodes
141
35k
Building a A Zero-Code AI SEO Workflow
portentint
PRO
0
380
Practical Orchestrator
shlominoach
191
11k
Discover your Explorer Soul
emna__ayadi
2
1.1k
<Decoding/> the Language of Devs - We Love SEO 2024
nikkihalliwell
1
150
A Modern Web Designer's Workflow
chriscoyier
698
190k
The SEO identity crisis: Don't let AI make you average
varn
0
410
Transcript
DevSecOps Best Practices: Secure Everything You Have April 20, 2024
Sena Yakut
About me! DevSecOps Best Practices: Secure Everything You Have Sena
Yakut Senior Cloud Security Engineer senayakut.com sena_yakutt sena-yakut Lyrebird Studio
Agenda My Recommendations What, Why and How? Secure in Every
Step
We don't live in a perfect world. Even the smallest
thing you do is worth its weight in gold.
We need lots of people to do all of these.
Do whatever you can.
We do not focus on tools. You can choose whatever
you want. Your architecture, Your team, Your budget
Plan - Threat modeling, - Secure code standards, - IDE
plugins
Plan You can read my blog: Use Amazon CodeWhisperer for
Your AWS Security
Code - Static Application Security Testing (SAST), - Software Composition
Analysis, - Supply Chain Attacks, - Secure Pipelines, - Secret Scanning
Code Static Application Security Testing (SAST)
Code Software Composition Analysis
Code Software Composition Analysis
Code Secret Scanning
Build and Test - Dynamic Application Security Testing (DAST): Mobile
apps, web apps - Cloud Configuration Checks, - Vulnerability Management, - Penetration Testing, - API Testing
Build and Test
Build and Test
Release and Deploy -Access management -Live site pentesting -Configuration checks
Operate and Monitor - Alerts and Monitoring, - Threat Intelligence,
- Log Analysis, - Asset Inventory and Monitoring
Operate and Monitor
Operate and Monitor
Cultural Aspect -Automation alone will not solve the problems. -Encourage
your security mindset. -Avoid the blame game. -Build relationships with teams, don’t isolate.
DevSecOps Best Practices: Secure Everything You Have Sena Yakut Senior
Cloud Security Engineer senayakut.com sena_yakutt sena-yakut Lyrebird Studio