Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

06:30 PM

Testing & Automation Pay Off for NSA's DevSecOps Project

Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

For companies concerned with security as they push for faster development, a hallmark of agile frameworks such as DevOps, the US National Security Agency (NSA) has a message for you: Test, take it slow, but do it right and your developers will thank you.

Starting in 2018, the NSA embarked on a project to build more support for its developers and combine multiple instances of source code repositories. While the secretive government agency — whose missions include both spying on the communications of other countries and striving to secure US classified networks — has to work within the restrictions of a largely air-gapped network, the DevX team created a "highly available, elastically scalable architecture in AWS" that allows fast software development in a secure environment, Eric Mosher, technical lead for the DevX DevOps Pipeline at the NSA, said in a presentation at the virtual GitLab Commit conference last week.

Related Content:

Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

Special Report: Computing's New Normal, a Dark Reading Perspective

NSA Offers Guidance on Mitigating Cloud Flaws

Originally, installed from code in 2013, the NSA's source repository languished until 2018, when the agency kicked off its DevX project to improve the experience of developers. The team did an extensive rearchitecting of its approach to keep its security requirements while allowing the fewest custom changes as possible. Even with numerous dry runs, the developers still ran into problems, Mosher said.

"We didn't know the right kind of testing to do, and we needed some smarter automation," he said. "After the upgrade, we made sure to build in more of this automated testing ... and we added that smarter automation."

In the end, however, the project resulted in a fully DevOps-capable pipeline that allows government developers to build features more quickly yet still comply with the strict security regulations governing the NSA's operation, Mosher said.

"One of the things that is really great for me is having people coming to us and say thank you ... you are really empowering our mission," he said.

The NSA joins many other companies in committing to DevOps, and the security-inclusive DevSecOps, which have both made significant inroads into companies in the past year. No wonder: Developers get measured on the quality of their code (36%) and using feedback from customers (35%), and security plays into both of those metrics, Amy DeMartine, vice president and research director with Forrester Research said during a presentation at the virtual conference.

"What do developers care about? Developers are measured quite differently than the security team, [but] when you think about what they are looking at and how they are measured and what their success looks like, security plays into both of those," she said.

While business competition is pushing companies to speed up their development, the realities of cybersecurity are forcing companies to incorporate more security checks into development. In 2019, for example, a third of companies suffered a breach, according to Forrester, and for external attacks, the top causes of breaches were software vulnerabilities, accounting for 40% of specified causes, and web application flaws, accounting for 37%. (The survey allowed more than one answer.)

Automation, however, can both speed development and improve security. While developers' top priorities in the next 12 months include using more cloud-based development environments and better meeting their company's business demands, automation features heavily in the top 10 future priorities. Developers want to increase automation of secure development life cycle, speed up their release and deployment cycles, and use more open source software to decrease development time. 

The result is that 38% of developers are releasing software monthly or faster, up from 27% in 2018, according to Forrester Research.

The same automation applied to security makes a difference, Forrester's DeMartine said. Companies that automatically scan their applications on a daily basis — 300 times or more a year — fix vulnerabilities 11.5 times faster than those who scan less than three times a year, according to an analysis by software-security firm Veracode and cited by DeMartine.

"They are trying to release faster, they are trying to get their genius out to customers faster than they ever had before," she said. 

Forrester recommends that companies implement static application security testing (SAST), dynamic application security testing (DAST), and software composition analysis (SCA). So far, only a third of companies have implemented SAST at the development stage, but more companies plan to implement DAST during development and testing, — 34% and 43%, respectively — with the more interactive application security testing (IAST) showing even better numbers. 

Software composition analysis, which includes managing and checking the security of open source components is also taking off with 37% of companies planning to add the capability to development, up from 31% who have it implemented today, according to Forrester. 

In the end, the NSA widely adopted automation to speed up — and make more reliable — its own infrastructure. The agency uses Terraform for cloud-infrastructure automation, Ansible for build automation, and GitLab for continuous integration and continuous deployment. Out of the large infrastructure created in the cloud, only two applications are custom to the NSA, Mosher said.

"That's why we are able to move quickly," he said. "We cut down on any custom work that we are doing, and those custom things are very, very stable and they integrate well."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-24
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with &lt...
PUBLISHED: 2021-06-24
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainabl...
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.