Information Security Management Through Reflexive Security
Information Security Management Through Reflexive Security
Information Security Management Through Reflexive Security
Management through
Reflexive Security
Six Pillars in the Integration of Security,
Development and Operations
The permanent and official location for Cloud Security Alliance DevSecOps is
https://cloudsecurityalliance.org/group/DevSecOps/
© 2019 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your
computer, view, print, and link to the Cloud Security Alliance at https://cloudsecurityalliance.org
subject to the following: (a) the draft may be used solely for your personal, informational, non-
commercial use; (b) the draft may not be modified or altered in any way; (c) the draft may not be
redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote
portions of the draft as permitted by the Fair Use provisions of the United States Copyright Act,
provided that you attribute the portions to the Cloud Security Alliance.
Contributors:
Michael Roza
Sean Heide
David Lewis
Eric Gauthier
CSA Staff:
Sean Heide
Organizations today are faced with a number of information security management issues, including:
All of these factors pressure an organization’s information security processes to deliver more for less.
Given its strengthening adoption, it is necessary to consider its impact on information security itself
and look to apply those practices to the arena of information security management.
Distilling from the cultural and philosophical elements of such collaborative practices, as well as from
the exemplary contexts where those practices were derived from, six major principles are described
in this document to demonstrate the principles of achieving
Application to security
DevOps is now broadly practiced but it has been generally separated from security practices. There
is currently no standardized term in industry that cater to this aspect. A number of terms have been
proposed by members of the community, including “DevOpsSec”, “DevSecOps”, “SecDevOps”, to explain
the intersection of security and DevOps, as well as the amalgamation of security, development and
operations practices.
These terms have been used interchangeably, but the meanings they convey can be vastly different.
The definitions of these terms can also widely conflict with each other depending on the particular
understanding of the reader. Moreover, there is no industry recognized definition for security automation,
which is a core concept to the application of DevOps practices to security operations, leading to
confusion and misinterpretations. It is therefore crucial to clarify and standardize such terms for a global
and wider industry audience.
© Copyright 2019, Cloud Security Alliance. All rights reserved. 6
Target Audience
The target audience of this document includes those involved in the management and operational
functions of risk, information security and information technology. This includes the C-suite (CISO,
CIO, CTO, CRO, COO, CEO), and especially to the individuals involved in the following functional
areas: automation, DevOps, quality assurance, InfoSec, governance, risk management and
compliance.
Scope
This document defines “Reflexive Security” as a new security management approach that is built
upon the interrelationships between security, development and operations necessary for protecting
the security stance and the deliverables of an organization.
The benefits of combining security, development and operation practices for integrated
management are also described.
Several approaches to Reflexive Security are suggested to resolve the availability gap of cyber
security professionals.
Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
DevOps
Application of software development methodologies to infrastructure operations.
DevOpsSec
Application of information security principles and practices to protect processes that utilize DevOps
culture, practices, and workflows
SecDevOps
Application of DevOps culture, practices, and workflows for the achievement of information security
and compliance management
Reflexive Security
General
Reflexive Security is an approach for information security management built upon the principles
of Agile and DevOps. It is a non-prescriptive framework that is purely needs-based, emphasizes
collective responsibility, and considers information security and its responses to be a holistic
function of the organization.
The word “Reflexive” is used for its meaning from the reflexive relation in mathematical sets, where
every element in a such a relation is related to itself. In Reflexive Security, every action taken is
related to the context and needs of the organization itself.
Reflexive Security emphasizes security across organizational roles that reacts to external and internal
threats in an agile and dynamic way. It aims to be a new information security management strategy
that is dynamic, interactive, effective and holistic.
Reflexive Security treasures dynamic information exchange within the organization. Like the
immune system of the human body, information is immediately propagated to adjacent, potentially
vulnerable functions given detection of a threat. A traditional ISMS approach is top-down: it requires
threat information to be reported back to the higher functions, before any response can be made. In
Reflexive Security, organization functions themselves are already integrated with security functions,
and can provide an immediate response to address potential impact. A centralized response is
important, but should not prohibit an immediate tactical approach.
The ISMS approach is about adopting best practices. However, often best practices that work in
larger organizations do not work with smaller ones. In fact, they can create an unnecessary burden
for smaller organizations, taking away precious time and effort and hence negatively affecting their
information security stances.
Top leadership commitment as required in an ISMS, while crucial, is insufficient. Top leadership has to
understand the nature of information security and needs to be committed to integrating information
security into each and every aspect of the organization. Top leadership must be themselves
integrated into the information security function -- fully understanding the risks and threats the
organization faces (its risk profile) with regards to information security, setting clear bounds and
requirements for personnel to adhere to.
The human link is often the weakest link in information security. Phishing, social engineering are
all techniques to trick an unsuspecting individual to voluntarily compromise the security of an
organization. Without full and active participation of the involved individuals, beyond awareness,
information security simply cannot be achieved.
Responsible collectively
Security leadership plays a shepherding role for information security within an organization.
However, everyone is responsible for an organization’s security. Each individual has their own security
responsibility, and they must be aware of their own contribution (and potential problems) towards
the organization’s security stance. Edge users not only have to be security-aware, they are the first
line of defence for the organization.
Pragmatic
Security should provide value, not a hindrance. For every security initiative or adopted security
control, a cost-benefit should be prepared demonstrating the value of security. Without a pragmatic
approach, it is easy for persons unaware of the benefits of security to dismiss security practices
as mere overhead or unnecessary. A pragmatic approach provides crucial information in building
business case evidence to convince stakeholders of the importance of security, giving them
confidence that plans will be executed faithfully.
The traditional ISMS approach relies on a best practices approach which could easily lead to
overhead. Rarely are organizations not resource-constrained, and it is necessary to balance tailoring
requirements to the organization against the adoption of best practices. Requirements must be
based on organizational risks and value for maximum effectiveness.
Automate
Automated security practices are the core of optimizing process efficiency. Processes that can be
automated should be automated, and those that can’t should be transformed. Automation also
creates its own set of problems but automated approaches to those problems are often possible.
A mantra in software development says, if one does the same thing three times, it will be time to
program it. This approach applies squarely to Reflexive Security.
Elastic
Growing maturity of a Reflexive Security approach could lead to achievement of formal ISMS
requirements, while being flexible enough to only target critical areas for maximum value based
on actual risks. Its principles allow scaling according to organizational risks and needs, preventing
permanent overhead in resource consumption.
Resilient
Security no longer relies on a single security function, e.g. a single security department, but security
practices are integrated with business processes and embedded throughout the organization.
When compared to ISMS processes, an Reflexive Security approach often enables deeper security
involvement amongst personnel, resulting in more resilient security activities.
Tailored
Prioritized approach to provision stronger protection to core or more vulnerable processes over
those less exploitable. The traditional ISMS approach often applies the same set of controls across all
processes, leading to inefficient resource allocation.
Dynamic
The protection of business goals is performed by integrating security with business processes, often
down to the tactical level. This allows the organization to react faster and more effectively to threats
and incidents.
Concepts made apparent by Agile software development practices (where “Agile” is the generic term
including practices like Scrum), such as incremental development, collaborative authoring, test- or
behavior-driven programming, and continuous integration, have given rise to infrastructure operation
practices such as continuous delivery, software-defined infrastructure and infrastructure automation.
These infrastructure-related practices are widely considered to be part of the “DevOps” repertoire,
but with several conflicting definitions of what exactly the term represents, it is necessary to clarify
and standardize its definition in order to evaluate and address its information security impact1.
Its practices can entail different processes and outcomes depending on organizational context.
Its processes could provide organizational-wide benefits through empowering integration and
interaction between development and operations (e.g., the “build” and “run” processes), or in some
cases, have minimal impact in complex enterprise teams where logistics and governance controls
limits the application of DevOps2.
The application of Agile and DevOps practices and related tools clearly have blended borders
between software development and service infrastructure automation. Information security
management and operations can benefit from an identical approach, with even tighter integration
since it already depends on both software development and infrastructure automation.
The practices of DevSecOps, DevOpsSec and SecDevOps, as described below, provide necessary
insights for the achievement of Reflexive Security.
The three major aspects of how Agile and DevOps principles can help achieve Reflexive Security for
information security management are shown below:
1
For example, the Wikipedia article on DevOps defines it as “a set of practices that emphasizes the
collaboration and communication of both software developers and information technology (IT)
professionals while automating the process of software delivery and infrastructure changes”. This
definition is too vague for evaluating the impact of DevOps on information security practices.
2
https://devops.com/enterprise-devops-doesnt-make-sense/
While DevOps practices can help improve the management and operations of information security
processes in an organization, the execution of these practices have to be secured. Specifically,
organizations have to ensure that DevOps practices introduced do not compromise information
security. This aspect has been called “DevOpsSec”, or “DevOps security”. DevOps practices strongly
impact existing infrastructure and operations on it. Inherent security requirements in DevOps
processes must be considered in the adoption of DevOps within an organization.
IMPLICATIONS
Security vulnerabilities can be inadvertently created due to lack of consideration of all aspects
surrounding the infrastructure, for example, lax firewall rulesets, default credentials or an increased
attack surface. While software development and infrastructure operation skills are closely related,
mastery in one may not necessarily translate into proficiency of the other.
EXAMPLE PRACTICES
• Infrastructure
-- Security baseline checking on software-defined infrastructure
-- Automated security checks on DevOps infrastructure
• Containers
-- Security baseline checking
-- Automated hardening and management
-- Vulnerability checks and file scans
-- Automated integrity and authenticity checking
• Operating Systems / VM images
-- Automatic hardening during provisioning
-- Automated integrity and authenticity checking
• Secure Coding and Testing
-- In-field compliance testing
• Release Management
-- Automated vulnerability scans integrated with development and deployment workflow
• Business Continuity
-- Automated business continuity drills
-- Automated tests for backup and restore processes
• SSL Certificates and Public Key Infrastructure
-- Verification of certificate source and validity
-- Automated testing to ensure validity of issuer
DevOps provides powerful concepts that link development and infrastructure operations, and
its practices can be integrated to facilitate the achievement of information security within an
organization. The field of “DevSecOps”, or “DevOps for Security Operations”, applies DevOps
concepts to enhance the efficiency and effectiveness of information security processes. Its aim
is to facilitate the comparable paradigm shift of DevOps on infrastructure operations to security
operations, through the integration with development and infrastructure operations.
IMPLICATIONS
On a tactical level, DSO represents the integration and automation of security controls through
DevOps using automated toolchains. The CSO sets the policies following organizational goals,
requirements and risk management, which could be applied programmatically.
EXAMPLE PRACTICES
• Infrastructure
-- Immutable infrastructures
• QA
-- Implementation of data masking of data used in development for testing
• Containers
-- Vulnerability scanning during building of container images
-- Patch management of applications and libraries inside containers
-- Hardening / secure configuration, self-healing
-- PKI / Digital signatures
-- Anti-virus scan during building of container images
-- Certify container images
-- Scan for embedded keys, hardcoded credentials, push for role based access technology,
licensing compliance
-- Cryptographically sign and certify container images
-- Runtime container security delivered by monitoring container activities
• Operating Systems / VM images
-- Vulnerability scanning during building of VM images
-- Patch management of applications and libraries of the operating system
-- Hardening / secure configuration, self-healing
-- Anti-virus scan during building of VM images
-- Cryptographically sign and certify VM images
The practice of “SecDevOps”, or “Security DevOps”, aims to utilize DevOps practices to the
implementation of information security processes. Similar to how DevOps concepts are able
to improve the collaborative nature of development and infrastructure operations, SecDevOps
integrates and facilitates collaboration of development with information security processes. A
common result is the automation of information security processes (the “build”), accompanied by
allowing development processes to be abreast of security implications and deliverable feedback.
IMPLICATIONS
“Security as Code” is not equivalent to security automation because it does not require the
“programmatic” ability. For example, a scripted application of the DoD Security Technical
Implementation Guides (STIG) may still have to be run manually during the installation of a server.
EXAMPLE PRACTICES
• Business Continuity
-- Automatic business continuity plan testing through Infrastructure as Code (IaC)
-- Continuous backup and restore testing with data masking
• SSL Certificates and Public Key Infrastructure
-- Monitoring and auto renewal of SSL certificates
-- Testing of expiry dates of SSL certificates
-- Private and public key rotation
Culture Shock
The goal of DevOps has been to write code and move product into production as fast as possible
while maintaining a single source of truth, and removing or sidelining any barriers to their progress.
The goal of security has always been too protect the organization internally and externally from
access. Individually the goals are admirable until it gets to the point where DevOps deploys insecure
software or security delays deployments to the point where the organization’s goals are affected.
Embedding Security into DevOps can be a shock to the traditional system. Plan to deal with the
issues of DevOps and Security working closely with common goals and metrics. Plan for the personal
effects of automation: changed, lost and or new positions.
Cross-train
Form an operational security function by selecting key persons that have an interest or background in
security from each team and delegate security related tasks to those individuals. Make these persons
a representative of the operational security teams.
Delegate
Delegate risk management, maintenance of BCPs etc. to department heads. Freeing up resources of
the dedicated security team so they can focus on the security process management and providing
the framework(s). The department heads know exactly what they have in house, what risks there are.
Reflexive Security is process neutral. Organizations can use Agile, Scrum or any other development
methodology. Have security engineers attend daily scrum meetings, make them part of the team.
Reflexive Security provides a set of wide-implicating and easily understandable principles that
affect an organization’s cybersecurity posture, especially suitable for operating under resource and
personnel constraints in today’s fast-paced and challenging cybersecurity landscape.