Skip to main content

SecOps


SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals. The premise behind SecOps is to ensure that security and operations teams share accountability, processes, tools and information to make sure the organization does not not have to sacrifice security for higher uptime and better performance. Keeping both teams involved in the process provides greater visibility into what changes are required and what the impact of those changes on other parts of the business might be.

The process of merging security with operations involves several steps. The first is to consolidate priorities and decision making processes. Next, communication channels, software tools and authorizations to information need to become shared in order to give every team member a uniform, holistic view of development. Lastly, all development processes need to be updated to incorporate security at each stage.

The most critical difference between SecOps and alternative management methodologies is that security is included in the responsibility of all team members and in every aspect of the organization. For example, a customer service agent may notice a suspicious email notification or an engineer could report a SQL injection attempt.

As information security teams play a more crucial role in organizations, SecOps is important in making sure the gap between security and operations does not cause company-wide issues. The collaboration of security teams with operations teams helps organizations reduce process inefficiencies, become more secure overall and share accountability.

Goals of SecOps

Goals of a successful SecOps approach revolve around introducing security aspects earlier or at every stage of the development cycle. Emphasis is placed on upper management to commit to making security improvements, in order to implement a more holistic roadmap. Objectives can also include cross-team collaboration and cross-functional review of operational risks.

SecOps may be a cultural change for some organizations that requires larger issues to be addressed before goals can be achieved. In this situation, objectives may include redefining job roles and priorities, outlining business risks associated with security incidents and agreeing on core business functions.

Benefits
Implementing a SecOps approach is associated with the following benefits:
  • Higher return on investment (ROI).
  • Improved productivity.
  • More efficient use of shared resources.
  • Fewer application or service disruptions.
  • More streamlined security audit
  • Greater visibility of security vulnerabilities across the organization.
  • Easier adoption of technologies that require advanced security measures, such as cloud services.
  • Stronger incident management and response
  • More effective patch
  • Fewer compliance

DevSecOps

A term related to SecOps is DevSecOps, a process that layers security practices between development and operations. Although the term DevSecOps is relatively new, the idea of addressing security at each stage of the software lifecycle has been around for years. DevSecOps often focuses on an Agile approach to development, which is aimed at speed and efficiency. Teams are working together increasingly to ensure that security stays on par with development and operations.


Comments

Popular posts from this blog

Black swan

A  black swan event  is an incident that occurs randomly and unexpectedly and has wide-spread ramifications. The event is usually followed with reflection and a flawed rationalization that it was inevitable. The phrase illustrates the frailty of inductive reasoning and the danger of making sweeping generalizations from limited observations. The term came from the idea that if a man saw a thousand swans and they were all white, he might logically conclude that all swans are white. The flaw in his logic is that even when the premises are true, the conclusion can still be false. In other words, just because the man has never seen a black swan, it does not mean they do not exist. As Dutch explorers discovered in 1697, black swans are simply outliers -- rare birds, unknown to Europeans until Willem de Vlamingh and his crew visited Australia. Statistician Nassim Nicholas Taleb uses the phrase black swan as a metaphor for how humans deal with unpredictable events in his 2007...

A Graphics Processing Unit (GPU)

A graphics processing unit (GPU) is a computer chip that performs rapid mathematical calculations, primarily for the purpose of rendering images. A GPU may be found integrated with a central processing unit (CPU) on the same circuit, on a graphics card or in the motherboard of a personal computer or server. In the early days of computing, the CPU performed these calculations. As more graphics-intensive applications such as AutoCAD were developed; however, their demands put strain on the CPU and degraded performance. GPUs came about as a way to offload those tasks from CPUs, freeing up their processing power. NVIDIA, AMD, Intel and ARM are some of the major players in the GPU market. GPU vs. CPU A graphics processing unit is able to render images more quickly than a central processing unit because of its parallel processing architecture, which allows it to perform multiple calculations at the same time. A single CPU does not have this capability, although multi...

6G (sixth-generation wireless)

6G (sixth-generation wireless) is the successor to 5G cellular technology. 6G networks will be able to use higher frequencies than 5G networks and provide substantially higher capacity and much lower latency. One of the goals of the 6G Internet will be to support one micro-second latency communications, representing 1,000 times faster -- or 1/1000th the latency -- than one millisecond throughput. The 6G technology market is expected to facilitate large improvements in the areas of imaging, presence technology and location awareness. Working in conjunction with AI, the computational infrastructure of 6G will be able to autonomously determine the best location for computing to occur; this includes decisions about data storage, processing and sharing.  Advantages of 6G over 5G 6G is expected to support 1 terabyte per second (Tbps) speeds. This level of capacity and latency will be unprecedented and wi...