Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

8/31/2020
06:30 PM
50%
50%

Testing & Automation Pay Off for NSA's DevSecOps Project

Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

For companies concerned with security as they push for faster development, a hallmark of agile frameworks such as DevOps, the US National Security Agency (NSA) has a message for you: Test, take it slow, but do it right and your developers will thank you.

Starting in 2018, the NSA embarked on a project to build more support for its developers and combine multiple instances of source code repositories. While the secretive government agency — whose missions include both spying on the communications of other countries and striving to secure US classified networks — has to work within the restrictions of a largely air-gapped network, the DevX team created a "highly available, elastically scalable architecture in AWS" that allows fast software development in a secure environment, Eric Mosher, technical lead for the DevX DevOps Pipeline at the NSA, said in a presentation at the virtual GitLab Commit conference last week.

Related Content:

Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

Special Report: Computing's New Normal, a Dark Reading Perspective

NSA Offers Guidance on Mitigating Cloud Flaws

Originally, installed from code in 2013, the NSA's source repository languished until 2018, when the agency kicked off its DevX project to improve the experience of developers. The team did an extensive rearchitecting of its approach to keep its security requirements while allowing the fewest custom changes as possible. Even with numerous dry runs, the developers still ran into problems, Mosher said.

"We didn't know the right kind of testing to do, and we needed some smarter automation," he said. "After the upgrade, we made sure to build in more of this automated testing ... and we added that smarter automation."

In the end, however, the project resulted in a fully DevOps-capable pipeline that allows government developers to build features more quickly yet still comply with the strict security regulations governing the NSA's operation, Mosher said.

"One of the things that is really great for me is having people coming to us and say thank you ... you are really empowering our mission," he said.

The NSA joins many other companies in committing to DevOps, and the security-inclusive DevSecOps, which have both made significant inroads into companies in the past year. No wonder: Developers get measured on the quality of their code (36%) and using feedback from customers (35%), and security plays into both of those metrics, Amy DeMartine, vice president and research director with Forrester Research said during a presentation at the virtual conference.

"What do developers care about? Developers are measured quite differently than the security team, [but] when you think about what they are looking at and how they are measured and what their success looks like, security plays into both of those," she said.

While business competition is pushing companies to speed up their development, the realities of cybersecurity are forcing companies to incorporate more security checks into development. In 2019, for example, a third of companies suffered a breach, according to Forrester, and for external attacks, the top causes of breaches were software vulnerabilities, accounting for 40% of specified causes, and web application flaws, accounting for 37%. (The survey allowed more than one answer.)

Automation, however, can both speed development and improve security. While developers' top priorities in the next 12 months include using more cloud-based development environments and better meeting their company's business demands, automation features heavily in the top 10 future priorities. Developers want to increase automation of secure development life cycle, speed up their release and deployment cycles, and use more open source software to decrease development time. 

The result is that 38% of developers are releasing software monthly or faster, up from 27% in 2018, according to Forrester Research.

The same automation applied to security makes a difference, Forrester's DeMartine said. Companies that automatically scan their applications on a daily basis — 300 times or more a year — fix vulnerabilities 11.5 times faster than those who scan less than three times a year, according to an analysis by software-security firm Veracode and cited by DeMartine.

"They are trying to release faster, they are trying to get their genius out to customers faster than they ever had before," she said. 

Forrester recommends that companies implement static application security testing (SAST), dynamic application security testing (DAST), and software composition analysis (SCA). So far, only a third of companies have implemented SAST at the development stage, but more companies plan to implement DAST during development and testing, — 34% and 43%, respectively — with the more interactive application security testing (IAST) showing even better numbers. 

Software composition analysis, which includes managing and checking the security of open source components is also taking off with 37% of companies planning to add the capability to development, up from 31% who have it implemented today, according to Forrester. 

In the end, the NSA widely adopted automation to speed up — and make more reliable — its own infrastructure. The agency uses Terraform for cloud-infrastructure automation, Ansible for build automation, and GitLab for continuous integration and continuous deployment. Out of the large infrastructure created in the cloud, only two applications are custom to the NSA, Mosher said.

"That's why we are able to move quickly," he said. "We cut down on any custom work that we are doing, and those custom things are very, very stable and they integrate well."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29458
PUBLISHED: 2020-12-02
Textpattern CMS 4.6.2 allows CSRF via the prefs subsystem.
CVE-2020-29456
PUBLISHED: 2020-12-02
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in ...
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...