Skip to content

Commit 7b76211

Browse files
committed
update again
1 parent bc94ddc commit 7b76211

2 files changed

Lines changed: 12 additions & 13 deletions

File tree

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/8a-design-devsecops-processes.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,6 @@ metadata:
99
ms.author: ceperezb
1010
ms.topic: unit
1111
ai-usage: ai-generated
12-
durationInMinutes: 17
12+
durationInMinutes: 16
1313
content: |
1414
[!include[](includes/8a-design-devsecops-processes.md)]

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8a-design-devsecops-processes.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -101,16 +101,18 @@ Prepare your landing zone design with automated management and monitoring:
101101

102102
## Adopt secure development and platform practices
103103

104-
The Secure methodology's adoption guidance covers security posture modernization. Adoption is the broadest phase for DevSecOps, addressing how you implement security controls across development workflows, platform infrastructure, CI/CD pipelines, and incident response.
104+
Adoption is the broadest phase for DevSecOps. The Secure methodology's adoption guidance addresses how you implement security controls across development workflows, platform infrastructure, CI/CD pipelines, and incident response.
105105

106-
### Shift-left security and posture modernization
106+
### Posture modernization
107107

108-
The adoption guidance recommends three practices that apply to DevSecOps:
108+
Security posture modernization starts with establishing baselines and automating controls:
109109

110110
- **Operationalize your security baseline**: Apply the baseline established during planning as the standard against which all development environments and pipeline configurations are measured. Use security posture scoring tools to track progress and generate actionable recommendations.
111111
- **Embrace automation**: Use IaC tools with declarative templates integrated into CI/CD pipelines for infrastructure deployments, testing, monitoring, and scaling. Automation reduces the risk of human error and improves consistency across environments.
112112

113-
The Secure methodology also describes a "shift left" approach that moves security from end-of-development auditing to continuous integration throughout the lifecycle:
113+
### Shift-left security
114+
115+
The shift-left approach moves security from end-of-development auditing to continuous integration throughout the lifecycle:
114116

115117
| Traditional approach | Shift-left approach |
116118
| --- | --- |
@@ -123,15 +125,15 @@ Shifting left produces more robust code and resolves problems early when they're
123125

124126
### Secure the DevOps platform
125127

126-
The adoption guidance extends to securing the DevOps platform itself, because a compromised platform undermines all other security controls.
128+
A compromised DevOps platform undermines all other security controls, so platform hardening is a critical part of adoption.
127129

128130
- **Apply least-privilege access**: Use RBAC through a centralized identity provider, entitlement management for time-bound developer access, and just-in-time privileged access for platform administrator roles. Manage platform role assignments through centralized identity group memberships.
129131
- **Protect code and environments**: Restrict repository access with security groups, set branch permissions, and require code reviews from security-aware reviewers before merging to protected branches. Consider disabling permission inheritance to prevent unintended access escalation.
130132
- **Use workload identity federation for automated deployments**: Never use user accounts. Create separate identities per application and environment, scope permissions to only the required cloud subscriptions or resource groups, and store all secrets in a dedicated management solution. Deploy identities and federated credentials through IaC in a secure subscription vending process.
131133

132134
### Implement CI/CD pipeline security controls
133135

134-
The adoption guidance, reinforced by the Microsoft Cloud Security Benchmark (MCSB), defines security controls for CI/CD pipelines. Design your pipelines to implement these controls at each stage:
136+
The Microsoft Cloud Security Benchmark (MCSB) defines security controls for CI/CD pipelines. Design your pipelines to implement these controls at each stage:
135137

136138
- **Static application security testing (SAST)**: Integrate source code analysis, binary analysis, and credential scanning tools as gating controls that prevent vulnerable packages from committing, building, or deploying.
137139
- **Dynamic application security testing (DAST)**: Integrate runtime application testing and automated penetration testing into your CI/CD workflow.
@@ -142,7 +144,7 @@ Use deployment management features to manage cloud resources as a single cohesiv
142144

143145
### Prepare for incidents
144146

145-
The adoption guidance addresses incident preparedness as part of infrastructure and application security. A well-designed DevSecOps process includes built-in capabilities for detecting, responding to, and recovering from security incidents:
147+
A well-designed DevSecOps process includes built-in capabilities for detecting, responding to, and recovering from security incidents:
146148

147149
- **Threat detection**: Implement extended detection and response (XDR) and SIEM solutions integrated with your DevOps toolchain. XDR solutions provide automated investigation and response functionality that reduces response time.
148150
- **Vulnerability management**: Use the patch management and monitoring tools established during readiness for risk-based assessment, prioritization, and remediation.
@@ -172,12 +174,9 @@ The governance guidance also recommends automated compliance monitoring that pro
172174

173175
## Sustain security across DevSecOps operations
174176

175-
The Secure methodology's management guidance ensures that the security controls adopted and governed in earlier phases remain effective over time. Design DevSecOps processes that support ongoing improvement:
177+
The Secure methodology's management guidance ensures that the security controls adopted and governed in earlier phases remain effective over time. Design DevSecOps processes that support ongoing improvement. Examples include:
176178

177-
- **Security review board**: Create a board with representatives from development, operations, and security teams that continuously reviews projects, mandates security controls, and identifies improvement areas.
178179
- **Vulnerability management**: Integrate vulnerability findings directly into development backlogs so that remediation follows standard sprint workflows and risk scores are continuously tracked.
179180
- **Threat intelligence integration**: Use the MITRE ATT&CK knowledge base to develop threat models and inform security testing. Feed incident retrospectives and threat intelligence into backlog refinement so that posture changes align with live adversary behaviors.
180181
- **Security metrics**: Track metrics like mean time to detect (MTTD), secure score trends, and security coverage. Use these metrics to drive backlog prioritization and demonstrate security improvement to stakeholders.
181-
- **Threat hunting and detection engineering**: Adopt an "assume breach" mindset. Threat hunting uses hypothesis-based analysis to discover breaches, while detection engineering develops specialized mechanisms for novel attacks targeting development infrastructure and CI/CD pipelines.
182-
- **System integrity monitoring**: Enforce infrastructure changes only through IaC and approved deployment protocols. Investigate changes outside approved protocols immediately.
183-
- **Continuous education**: Conduct ongoing training in threat detection, incident response, and availability. Run regular security drills, including tabletop exercises that test incident response within a Zero Trust framework.
182+
- **System integrity monitoring**: Enforce infrastructure changes only through IaC and approved deployment protocols. Investigate changes outside approved protocols immediately.

0 commit comments

Comments
 (0)