You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/8a-design-devsecops-processes.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8a-design-devsecops-processes.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,16 +101,18 @@ Prepare your landing zone design with automated management and monitoring:
101
101
102
102
## Adopt secure development and platform practices
103
103
104
-
The Secure methodology's adoption guidance covers security posture modernization. Adoption is the broadest phase for DevSecOps, addressing how you implement security controls across development workflows, platform infrastructure, CI/CD pipelines, and incident response.
104
+
Adoption is the broadest phase for DevSecOps. The Secure methodology's adoption guidance addresses how you implement security controls across development workflows, platform infrastructure, CI/CD pipelines, and incident response.
105
105
106
-
### Shift-left security and posture modernization
106
+
### Posture modernization
107
107
108
-
The adoption guidance recommends three practices that apply to DevSecOps:
108
+
Security posture modernization starts with establishing baselines and automating controls:
109
109
110
110
-**Operationalize your security baseline**: Apply the baseline established during planning as the standard against which all development environments and pipeline configurations are measured. Use security posture scoring tools to track progress and generate actionable recommendations.
111
111
-**Embrace automation**: Use IaC tools with declarative templates integrated into CI/CD pipelines for infrastructure deployments, testing, monitoring, and scaling. Automation reduces the risk of human error and improves consistency across environments.
112
112
113
-
The Secure methodology also describes a "shift left" approach that moves security from end-of-development auditing to continuous integration throughout the lifecycle:
113
+
### Shift-left security
114
+
115
+
The shift-left approach moves security from end-of-development auditing to continuous integration throughout the lifecycle:
114
116
115
117
| Traditional approach | Shift-left approach |
116
118
| --- | --- |
@@ -123,15 +125,15 @@ Shifting left produces more robust code and resolves problems early when they're
123
125
124
126
### Secure the DevOps platform
125
127
126
-
The adoption guidance extends to securing the DevOps platform itself, because a compromised platform undermines all other security controls.
128
+
A compromised DevOps platform undermines all other security controls, so platform hardening is a critical part of adoption.
127
129
128
130
-**Apply least-privilege access**: Use RBAC through a centralized identity provider, entitlement management for time-bound developer access, and just-in-time privileged access for platform administrator roles. Manage platform role assignments through centralized identity group memberships.
129
131
-**Protect code and environments**: Restrict repository access with security groups, set branch permissions, and require code reviews from security-aware reviewers before merging to protected branches. Consider disabling permission inheritance to prevent unintended access escalation.
130
132
-**Use workload identity federation for automated deployments**: Never use user accounts. Create separate identities per application and environment, scope permissions to only the required cloud subscriptions or resource groups, and store all secrets in a dedicated management solution. Deploy identities and federated credentials through IaC in a secure subscription vending process.
131
133
132
134
### Implement CI/CD pipeline security controls
133
135
134
-
The adoption guidance, reinforced by the Microsoft Cloud Security Benchmark (MCSB), defines security controls for CI/CD pipelines. Design your pipelines to implement these controls at each stage:
136
+
The Microsoft Cloud Security Benchmark (MCSB) defines security controls for CI/CD pipelines. Design your pipelines to implement these controls at each stage:
135
137
136
138
-**Static application security testing (SAST)**: Integrate source code analysis, binary analysis, and credential scanning tools as gating controls that prevent vulnerable packages from committing, building, or deploying.
137
139
-**Dynamic application security testing (DAST)**: Integrate runtime application testing and automated penetration testing into your CI/CD workflow.
@@ -142,7 +144,7 @@ Use deployment management features to manage cloud resources as a single cohesiv
142
144
143
145
### Prepare for incidents
144
146
145
-
The adoption guidance addresses incident preparedness as part of infrastructure and application security. A well-designed DevSecOps process includes built-in capabilities for detecting, responding to, and recovering from security incidents:
147
+
A well-designed DevSecOps process includes built-in capabilities for detecting, responding to, and recovering from security incidents:
146
148
147
149
-**Threat detection**: Implement extended detection and response (XDR) and SIEM solutions integrated with your DevOps toolchain. XDR solutions provide automated investigation and response functionality that reduces response time.
148
150
-**Vulnerability management**: Use the patch management and monitoring tools established during readiness for risk-based assessment, prioritization, and remediation.
@@ -172,12 +174,9 @@ The governance guidance also recommends automated compliance monitoring that pro
172
174
173
175
## Sustain security across DevSecOps operations
174
176
175
-
The Secure methodology's management guidance ensures that the security controls adopted and governed in earlier phases remain effective over time. Design DevSecOps processes that support ongoing improvement:
177
+
The Secure methodology's management guidance ensures that the security controls adopted and governed in earlier phases remain effective over time. Design DevSecOps processes that support ongoing improvement. Examples include:
176
178
177
-
-**Security review board**: Create a board with representatives from development, operations, and security teams that continuously reviews projects, mandates security controls, and identifies improvement areas.
178
179
-**Vulnerability management**: Integrate vulnerability findings directly into development backlogs so that remediation follows standard sprint workflows and risk scores are continuously tracked.
179
180
-**Threat intelligence integration**: Use the MITRE ATT&CK knowledge base to develop threat models and inform security testing. Feed incident retrospectives and threat intelligence into backlog refinement so that posture changes align with live adversary behaviors.
180
181
-**Security metrics**: Track metrics like mean time to detect (MTTD), secure score trends, and security coverage. Use these metrics to drive backlog prioritization and demonstrate security improvement to stakeholders.
181
-
-**Threat hunting and detection engineering**: Adopt an "assume breach" mindset. Threat hunting uses hypothesis-based analysis to discover breaches, while detection engineering develops specialized mechanisms for novel attacks targeting development infrastructure and CI/CD pipelines.
182
-
-**System integrity monitoring**: Enforce infrastructure changes only through IaC and approved deployment protocols. Investigate changes outside approved protocols immediately.
183
-
-**Continuous education**: Conduct ongoing training in threat detection, incident response, and availability. Run regular security drills, including tabletop exercises that test incident response within a Zero Trust framework.
182
+
-**System integrity monitoring**: Enforce infrastructure changes only through IaC and approved deployment protocols. Investigate changes outside approved protocols immediately.
0 commit comments