当前位置:网站首页>Devsecops in Agile Environment
Devsecops in Agile Environment
2022-06-11 05:56:00 【Longzhi Devops solution】

At first glance ,DevSecOps And agile seem to be different things . actually , These methodologies are often complementary . Let's see why .
Agile is a methodology , It aims to provide flexibility for the team in the software development process .DevSecOps It is to add automatic security in the existing automatic software development process . Both methodologies require a high level of communication between different stakeholders , And make continuous improvement a part of the process .
however ,DevSecOps How exactly does it work in an agile environment ? Why in agile DevSecOps Very important ?
DevSecOps How to work in an agile environment
To understand DevSecOps How to work in an agile environment , We must first understand what agile is .
Agile is often synonymous with the concept of speed —— That is, fast release and frequent release . However , As software developers get faster and faster , The old prevention tools they use can no longer keep up . Precaution has become a deceleration belt , And is often bypassed , In order to quickly release code . as time goes on , Software becomes vulnerable to vulnerabilities , Infringement and hacking .
DevOps It was developed as a methodology , It enables application developers and software release teams to collaborate more effectively , To deliver applications faster .DevSecOps yes DevOps Evolution of , The driving force is in automation DevOps Add automated security to the process .
Despite the differences , But agility and DevSecOps Can be seen as complementary , Because they all try to achieve the same goal : Speed .
Promote prevention as the core function of agile workflow
DevSecOps The main purpose of is to avoid delaying the delivery of pipelines (pipeline). However , Poorly structured and constructed software also has the ability to slow delivery . As we enter a completely digital world , Ignore DevOps Security issues in the process will greatly reduce the team's ability to remain agile .
When agile processes are followed but not implemented correctly , Will appear “ Fake agility ”. It means , The team adopted sprints,、standups、 scrums and burndown charts And other forms of agile development , But the software produced was done in a hasty way . Without understanding how to properly implement the software to avoid destroying existing applications , False agility is common in organizations that blindly pursue rapid deployment .
A key value of the Agile Manifesto is to prioritize “ Working software, not comprehensive documentation ”. However , This means that software doesn't simply perform the functions it needs . Working software involves everything necessary for the software to work effectively and safely . This means taking into account not only the features and functions of the core code , There are other levels that need to be included , Such as infrastructure and security around it .
For teams and software , To be truly agile , They need to put DevSecOps Into their workflow .
The Conduit (pipeline) Automatic prevention function in : Part of the agile workflow
Automation is DevSecOps A valuable feature of , This is because it can continuously integrate the evolving O & M and security assessment 、 Continuous deployment and expansion . In design and concept ,DevOps Emphasize speed through automated deployment .DevSecOps Go one step further , Security protection agreement 、 Inspection and test automation , To ensure that the software is “ Universal ”, Not just in a sample .
When DevSecOps When the development cycle becomes part of the agile sprint , They can ensure that the delivered software remains robust , And update for potential vulnerabilities .
Agile is more than just the ability to deliver features and software . It includes the ability to respond to changes from any source , This covers the law of the market , Malicious actors and cyber attacks .
according to IBM Of 《2021 Annual data disclosure cost report 》, The average cost of a single data leak ranges from 386 Million dollars to 424 Thousands of dollars , Increased by nearly 10%.DevSecOps It is a measure to prevent cyber crime and malicious data hijacking through various methods such as zero trust .IBM According to the report , Compared with organizations that do not adopt this method , Organizations that adopt a zero trust approach reduce vulnerability costs 176 Thousands of dollars . Besides , Those who have mature DevSecOps Enterprises with processes can also be faster than those without 77 Days to contain loopholes .
With DevSecOps, Security is built into the application during development , This makes it easier to identify and resolve vulnerabilities . This ensures that when the software and its functions are delivered , They maintain the baseline level of functional quality .
The goal of agile design is , By enabling developers to create software that provides better products and services , Help organizations maximize profits . However , A broken application may result in a loss of revenue 、 Reduced customer trust 、 Reduced growth and market share . Besides , A vulnerability requires the transfer of resources to resolve the vulnerability , And ensure that the structure of the software meets the prevention requirements .
summary :DevSecOps And agile can coexist
Speed and prevention can coexist , Especially in DevSecOps And agile environments . Agile doesn't mean your team needs to sacrifice defensiveness ,DevSecOps It doesn't mean you have to sacrifice speed .
DevSecOps Very important , Because when implemented correctly with agile , Both speed and precaution can be realized on a large scale . Only when the delivered software is able to adapt to change at the least cost , To achieve agility . Bring developers 、 Quality assurance testers 、 Security experts and operation and maintenance personnel are integrated into one DevSecOps Team , Can build a cohesive software , Contains fewer errors , Better modularity and automation . In turn, , This also reduces the resistance of software structure and architecture caused by any change .
Source of the article :https://bit.ly/3GMCFdB
边栏推荐
- Aurora im live chat
- Functional interface lambda, elegant code development
- Manually splicing dynamic JSON strings
- ReferenceError: server is not defined
- If the MAC fails to connect with MySQL, it will start and report an error
- NFC Development -- utility tools and development documents (IV)
- Array partial method
- Principle of copyonwritearraylist copy on write
- NDK learning notes (IX) POSIX sockect connection oriented communication
- Use of vlayout
猜你喜欢

What should the cross-border e-commerce evaluation team do?

Multithreading tutorial (XXI) double checked locking problem

NDK learning notes (V)

This is probably the most comprehensive project about Twitter information crawler search on the Chinese Internet

Cocoatouch framework and building application interface

Implementation of data access platform scheme (Youzu network)

NDK learning notes (12) native graphics API, using avilib to create an avi video player

YOLOv5的Tricks | 【Trick8】图片采样策略——按数据集各类别权重采样

Altiumdesigner2020 import 3D body SolidWorks 3D model

Wechat applet learning record
随机推荐
"All in one" is a platform to solve all needs, and the era of operation and maintenance monitoring 3.0 has come
Yoyov5's tricks | [trick8] image sampling strategy -- Sampling by the weight of each category of the dataset
Set the IP address using batch
Xposed bypasses 360 reinforcement to get a real classloader
Super details to teach you how to use Jenkins to realize automatic jar package deployment
配置Rust编译环境
NDK learning notes (IV) functions, classes and exceptions of swig
Multithreading tutorial (XXVII) CPU cache and pseudo sharing
URL in flask_ for
Multithreading tutorial (XXII) happens before principle
Recursively process data accumulation
我们真的需要会议耳机吗?
Qmake implementation of QT project Pro script to vs solution
Functional interface lambda, elegant code development
获取程序exit的值
Slide the receleview horizontally to the far right to listen to the page loading function
Wechat applet text built-in component newline character does not newline reason
Utiliser le fichier Batch Enum
Super (subclass)__ init__ And parent class__ init__ ()
Multithreading tutorial (XXI) double checked locking problem