2020-08-23T18:24:00Z
Rony_Sklar - PeerSpot reviewer
Community Manager at a tech services company with 51-200 employees
  • 5
  • 788

What tools do you rely on for building a DevSecOps pipeline?

What are the different types of tools that should be used together in DevSecOps?

What are the specific tools that you like to use when working on your DevSecOps pipeline? 

What is essential, and what is a nice-to-have? 

6
PeerSpot user
6 Answers
VG
Chief Architect at Peristent Systems
Real User
Top 5Leaderboard
2021-05-31T09:29:13Z
May 31, 2021

I believe we need to cover the SDLC from start to end as much as possible while ensuring that this does not mean too many dashboards and also keeping the cost of development in mind.


1. IDE Checks: This is the 1st step in shift left approach. Many open source tools integrate easily with IDE (VSC, Eclipse) etc and allow developers to do a check even before they commit code on local branch. We have leveraged SonarLint (https://www.sonarlint.org/) which covers a vast spectrum of programming languages and IDEs.


2. SAST: Many open source tools available in this space which do a check around security vulnerability, security hotpots etc. We use SonarQube.


3. SCA: Check against open source security vulnerabilities and license compliance is very important. WhiteSource is what we use here.


4. IaaC scan: We need tools to manage and analyze infrastructure as code (IaC) scan results across platforms and be able to resolve the issues.


5. Monitoring: Once application is deployed into production, we need tools to monitor it live and be able to check for vulnerabilities and other issues which happen when 100's of users are using the application from across the globe.


There are other areas like DAST, IAST which become important depending on size, complexity and business needs.

Search for a product comparison in Application Security Testing (AST)
RS
Transformation Leader at TEKsystems (ex Aston Carter)
Real User
Top 20Leaderboard
2021-05-31T07:28:35Z
May 31, 2021

It depends on the budget, business and technology portfolio of the enterprise. 


If you predominantly web-based and service architecture-oriented technology portfolio, Veracode set of tools (Green-light, Veracode SAST, Veracode DAST) is a good option. Veracode is good if you have enterprise-level DevSecOps transformation. But Veracode may not work well for legacy systems. 


I have also used Microfocus Fortify effectively. Just on SCA, universally used Sonarqube with standard plugins is I prefer as it is easy to use. All these tools are very used to integrate into DevSecOps Application Pipeline.

TR
Founder at Saltworks Security
Real User
Top 20
2021-06-01T01:05:36Z
Jun 1, 2021

Everything in technology focuses on People, Process & Technology. What binds these together is business requirements and understanding the needs of each Line Of Business. Often each Line of Business requires completely different requirements, but what tools help you meet that unified vision and executive dashboard reporting to measure your KPIs.



  1. Code Repos – GitHub, GitLab

  2. Build Servers – Azure DevOps, Jenkins, Bamboo, TeamCIty

  3. Code Quality - SonarQube

  4. Software Composition Analysis (SCA) – Sonatype (Fortify Integration), Snyk, & BlackDuck

  5. Static Analysis (SAST) – Fortify On Premise, Fortify OnDemand (or Hybrid) CheckMarx (Fills the APEX, Perl, Groovy, etc.. gap that Fortify doesn’t cover)

  6. Infrastructure As Code (IaaC) – Aqua Security

  7. IAST – Not widely adapted due to agent limitations.

  8. DAST – WebInspect

    1. ScanCentral provides the most automation and scalability

    2. Highly Flexible API for Automation



  9. Metric Reporting – SaltMiner (Saltworks Security), Fortify SSC, Fortify OnDemand

  10. IDE (Eclipse, Visual Studio, JetBrains) – Fortify

  11. Continuous Monitoring - BitDiscovery


Why so much Fortify? It has been around 17 years, while it is old it is constantly evolving. It is the only Hybrid (Cloud & On-Premise Solution), it provides the flexibility needed for most customers. There is a reason why over 50% of Cigital (Synopsys) business is managing Fortify and not Synopsys tool suite. Deloitte, Accenture, IBM & Saltworks makes a lot of money managing Fortify. One thing you won’t hear from Gartner, Fortify SAST & DAST surpasses their competitors’ revenue by over 70%.

SA
Director, Digital Architecture at a pharma/biotech company with 10,001+ employees
Real User
2021-06-01T11:48:30Z
Jun 1, 2021

The detailed answers below are a good summary.  How are teams pulling all these tools together and orchestrating in terms of agile stories and feedback loops?  Azure DevOps, JIRA, ServiceNow, Other?

JV
CEO & Co-Founder at a computer software company with 11-50 employees
User
2020-08-24T13:01:40Z
Aug 24, 2020

Depends on budget and the larger approach to security, compliance, and risk. There are many solutions and approaches out there but many limit the ability to scale DevSecOps beyond an experiment and justify to business leaders. Standard response: SCA, SAST, DAST, IAST. Many of these tools are disconnected and some slow down performance quit a bit, especially your traditional household names. What are your goals and what are your constraints to developing a program?

GR
Technical Director at Quence srl
User
2020-08-24T07:33:04Z
Aug 24, 2020

Hi we think that is essential a tool for applying static analysis technologies for Code Quality and Security

Learn what your peers think about Checkmarx. Get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
687,947 professionals have used our research since 2012.
Related Questions
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Feb 22, 2023
Hello community, Please share your input and help out fellow peers. Thank you.
See 1 answer
LW
Content Editor at PeerSpot
Feb 22, 2023
Getting visibility into and control of complex or distributed cloud environments is not only a matter of investing in a CSPM (although that can be part of the answer). There are a number of additional approaches that can help. Let's look at a number of possibilities. The most obvious step is using a CSPM to view and manage resources in a centralized location. There's no doubt that having everything in one place makes it easier to monitor and control your cloud environment. And a CSPM can scale as your environment changes, while helping to automate processes. CSPMs are a maturing technology that can be very effective in bringing a complex environment into compliance and the alerts and remediation offered help to harden security posture. The CSPM market includes Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, Orca Security, Check Point CloudGuard Posture Management, Lacework, and Wiz, among others. On the visibility front, cloud monitoring tools like Auvik, Datadog, Centreon, or Amazon CloudWatch and Azure Monitor provide metrics and logs that can be used to identify issues and optimize performance. They can alert you to potential problems before they become critical. As noted, leveraging automation is going to be important when dealing with complex cloud estates. Automating common tasks will reduce the time and effort required to manage your cloud environment and can help create consistency across your systems. Tools like AWS CloudFormation, Google Cloud Deployment Manager, or Azure Resource Manager can automate the deployment and management of cloud resources. But beyond the tools are the security best practices that can also help bring things under control and help narrow down the search for issues when they occur. They include role-based access control, network segmentation, and encryption and they should help reduce the risk of unauthorized access and data breaches. Tried and true architectural approaches can also help, including containerization and microservices. These approaches simplify the management of complex or distributed cloud environments and break down applications into smaller, independent services, making issues easier to manage.
Avigayil Henderson - PeerSpot reviewer
Content Development Manager at PeerSpot
Feb 22, 2023
Hi community,  Please share your input and help out fellow peers. Thank you.
See 2 answers
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
Feb 19, 2023
Hi, some of the best cloud compliance reporting tools are as below- * Checkpoint CloudGuard Dome9 * Nutanix Xi Beam * Qualys Cloud Platform * Sophos Cloud Optix * Symantec Control Compliance Suite
LW
Content Editor at PeerSpot
Feb 22, 2023
There is probably no single tool that can completely unify cloud compliance reporting across all cloud providers and compliance frameworks. That's a pretty big ask (but a good one). But there are, of course, tools that streamline compliance reporting and make the process easier to manage across multiple cloud environments and compliance standards. These compliance management platforms can help identify compliance gaps, enforce policies, and generate compliance reports. Prisma Cloud enables you to monitor, view, and report on cloud infrastructure health and your compliance posture. You can create reports with both summary and detailed findings of security and compliance risks and it also offers a Compliance Dashboard and the ability to create custom compliance standards. Check Point CloudGuard Posture Management looks to automate conformance to regulatory requirements and security best practices. It provides compliance posture management for AWS, Azure, Google Cloud, Alibaba Cloud, and Kubernetes and claims to reference over 50 compliance frameworks. It also enables customization of cloud compliance with its proprietary Governance Specification Language. Touting 65 out-of-the-box frameworks, CIS Benchmarks, and custom compliance checks, Orca Security is an agentless solution that works across multiple cloud platforms. It exposes and prioritizes issues so that compliance gaps can be addressed strategically. Another option is Chef Compliance, which leverages certified, curated audit and remediation content and aims to make sure assets are always in compliance with CIS benchmarks and DISA STIGs. It supports multiple cloud providers and compliance frameworks. Perhaps lesser-known, CloudCheckr helps maintain security and compliance in the cloud and monitors cloud infrastructure against dozens of standards including PCI DSS, HIPAA, CIS, and NIST. Cloud One - Conformity, from Trend Micro, works toward security, compliance, and governance of cloud infrastructure with real-time monitoring and auto-remediation features for AWS, Microsoft Azure, and Google Cloud.
Related Articles
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 2, 2022
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the latest hot topics posted by your fellow PeerSpot Community members. Read articles, answer questions, and contribute to discussions that are relevant to you and your expertise. Or ask your peers for insight on topics that interest you! Trending Here are some topics that your peers are discussi...
See 1 comment
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 2, 2022
@Chris Childerhose, @PraveenKambhampati, @Deena Nouril, @Shibu Babuchandran and @reviewer1925439, Thank you for contributing your articles and sharing your professional knowledge with 618K PeerSpot community members around the globe as well as with a much bigger readers audience!
Deena Nouril - PeerSpot reviewer
Tech Blogger
Aug 5, 2022
What is OWASP? The OWASP or Open Web Application Security Project is a nonprofit foundation dedicated to improving software security. It operates under an open community model, meaning that anyone can participate in and contribute to OWASP-related online chats and projects. The OWASP ensures that its offerings (online tools, videos, forums, events, etc.) remain free and are easily accessible t...
See 2 comments
Ben Arbeit - PeerSpot reviewer
Manager at a retailer with 51-200 employees
Jul 31, 2022
Thanks for this informative article.
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a retailer with 10,001+ employees
Aug 5, 2022
OWASP is nice, but very specific and currently limited. How about trying ISO-24772 for all?
Related Articles
EB
Director of Community at PeerSpot (formerly IT Central Station)
Aug 2, 2022
Community Spotlight #19
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the lates...
Deena Nouril - PeerSpot reviewer
Tech Blogger
Aug 5, 2022
What is OWASP Top 10 in 2022
What is OWASP? The OWASP or Open Web Application Security Project is a nonprofit foundation dedi...
Download Free Report
Download our free Checkmarx Report and get advice and tips from experienced pros sharing their opinions. Updated: March 2023.
DOWNLOAD NOW
687,947 professionals have used our research since 2012.