Deployment systems — danger or defense?

How the systems that deploy software can dramatically increase or decrease cybersecurity risk

Teri Radichel
Cloud Security
Published in
21 min readDec 19, 2019

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

🔒 Related Stories: Cybersecurity for Executives | DevOps.

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A security scanning analogy explained below from my presentation about Top Priorities for Cloud Application Security originally at Countermeasure IT in Ottawa, Canada in November 2018

If you’ve been following along in this series of blog posts, soon to become a book on Cybersecurity for Executives, you have reached one of my favorite topics, and something I feel has been overlooked far too long in the realm of cybersecurity — deployment systems. As of late, this topic has been getting more attention, and I’m happy about that. However, I don’t think we’ve done enough yet, as I explain below.

Deployment systems — not a definition of DevOps and DevSecOps

This topic is related to DevOps and DevSecOps. Unfortunately, those terms have been misinterpreted, reinterpreted, abused, overused, debated incessantly, misunderstood, despised, and cartoon-ized in less than ideal ways (i.e., unicorns excreting rainbows). So instead of using trendy words with varying interpretations, I’m going to write about something…

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award