From a Commodore 64 to DevSecOps

From a Commodore 64 to DevSecOps

We all know the story: a farm, a kid, a Commodore 64, and a modem maxing out at 300 bps. A few unexpected phone bills later, and young Ian Allison is figuring out how to game the system so he can keep using his newfound gateway to the world of tech. According to Ian, that is where he began building the foundation of skills for his career in computer security.

At the recent All Day DevOps conference, Ian (@iallison), now with Intuit, talked about his history of being “that” security guy. You know, the one who thinks developers don’t care about security or deadlines, and, really, are just plain “stupid.” But, don’t worry, he is enlightened now and realizes that we all have the same goal - everyone wants to build a secure system.

Ian realized that, “security doesn’t understand how developers or operations works. Security solves for security, but that leaves everyone else in their own place.” He started his enlightenment when his career path led him to a place called DevSecOps - that is, DevOps where security plays a more integral role.

Ian pointed out that traditional InfoSec relies on Compliance, Regulations, Appliances, and Perimeter (CRAP). He then realized the selfishness of his own and his peer’s perspective: remediation was left up to the developers, the feedback they get are 200 page scanner reports, and it only solves problems for security and compliance. It doesn’t help developers reach their shared goal of a secure system.

DevOps creates an opportunity for security to get a better view into our infrastructure, operations and development efforts. DevOps is not only fast, lean, efficient, but when done right, it is collaborative and empathetic. Couple speed with collaboration and empathy, and DevSecOps can blossom.

Here is the reality that Ian was facing: scanners find the absolute bare minimum, bad default configs are a HUGE problem even with SaaS vendors, manual testing can uncover defects that have been hiding for year, and the attackers are more skilled and motivated.

How do you implement it and make it better?

  • Allow Dev teams to assume the risk of their decisions
  • No more Security exceptions or sign offs
  • Security is everyone’s responsibility
  • Test the crap out of your own stuff like an attacker would

At Intuit, Ian wanted to help build stronger bridges between development, operations, and security teams. To do this, he set up a Red Team to:

  • Use same tactics as attackers
  • Only scope is “Don’t take down production” 
  • Need to adapt and evolve like an attacker
  • Prove risks actually exists
  • Should be writing their own exploits
  • Should have ongoing campaigns that mimic attackers

The Red Team started small, lean, and focused on the cloud. They worked like an Agile DevOps team, working manually with the use of some tools. In the end, they found, reported, and fixed thousands of vulnerabilities not found by scanners.

Ian goes into more details and lessons learned in his full All Day DevOps conference session (just 30 minutes). The other 56 presentations from the All Day DevOps Conference are also available online, free-of-charge here.

This blog series is reviewing sessions from the All Day DevOps conference from November which hosted over 13,500 registered attendees. Last week I discussed, “System Hardening with Ansible”. Next week, look for my review of an awesome session by Erlend Oftedal: “There is No Server: Immutable Infrastructure and Serverless Architecture.”

IMPORTANT NOTICE: If you want to learn what others are doing in DevSecOps, take 5 minutes to complete our DevSecOps Community survey before February 28th. Over 2,200 people have participated and we'll share the survey results with everyone.

Derek E. Weeks Thanks for the summary and commentary on my talk. All Day DevOps was a great experience and I can't wait for the next one!

oh those heady C64 days... Thanks for posting Derek!

Good review of Ian's session at All Day DevOps.

To view or add a comment, sign in

More articles by Derek E. Weeks

  • Why Anaconda Acquired Outerbounds

    Today, we announced that Anaconda has acquired Outerbounds. But this isn’t really about an acquisition.

    5 Comments
  • The 10,000-hour rule in the age of AI

    In 2008, Malcolm Gladwell introduced the world to the 10,000-hour rule in his book Outliers. His point: mastery…

    4 Comments
  • Help Wanted: Vibe Coder, Marketing

    I spent an hour over the weekend listening to Lazar Jovanovic explain his job on Lenny's podcast. He's a Vibe Coder…

    16 Comments
  • Trust moves at human speed.

    "Trust moves at human speed". This is the truth that I keep coming back to.

    2 Comments
  • Your AI Isn’t “Better.” It Just Knows You.

    Remember the Vulcan mind meld from Star Trek? Spock would place his fingers on someone’s temples and say, “My mind to…

    7 Comments
  • Simulating Your Next Board Meeting with AI

    Today, I was playing with an AI prompt that let two personas have a “live” conversation about a marketing strategy…

    2 Comments
  • Agentic-Aware Testing: Winning in a World of AI-Powered Users

    “We have some new capabilities… agentic workers that are coming in, essentially to take all of the alerts that we…

    5 Comments
  • DevRel Makes an Impact at Conferences

    In a recent conversation on LinkedIn Live Radio, I participated in a thought-provoking discussion about the impact of…

  • Why Today's Solopreneurs Aren't Truly "Solo"

    Contrary to the common perception of a solopreneur working in isolation, the modern solopreneur is far from being a…

    11 Comments
  • Measuring brand affinity for community-led growth

    “The more we spoke about DevOps, the more our brand affinity in the market grew”, shared Mary Engvall - author of The…

    16 Comments

Others also viewed

Explore content categories