DevOps is booming. Technology leaders are embracing the approach that combines development and operations teams, automating many of their tasks to help them work faster, more creatively and underscoring their commitment to quality software engineering.
Meanwhile, risk managers, compliance officers, auditors and regulators want to know how, in this fast new world, DevOps teams govern and apply controls to manage privacy and security risks. Without adequate hardening and controls, DevOps can bring disruption and negatively impact the business, such as downtime or accidental changes to pricing data resulting in revenue loss. Another risk? It might cause challenges in maintaining an audit trail over all changes, which could jeopardize audit opinions and bring regulatory penalties.
That’s why it’s so crucial for developers and controls teams to be allies. Fast development and strong controls can go hand-in-hand. Leading companies design and administer controls that operate not at the sluggish pace often associated with oversight, but at the quick and agile speed of DevOps. In these organizations, everyone wins.
DevOps teams seek opportunities to eliminate slow processes. When you see any of these shifts occurring, consider them warning signs to update your controls strategy and environment:
Every organization differs in its processes, risk appetite, and regulatory and control environments. But if your teams propose any of these changes, it’s time to examine your controls strategy. For speed and security at the same time, get your product, technology and controls teams to work together. But how?
Change happens slowly at most organizations, in large part because it’s bogged down with rules like these:
Getting all these approvals may involve creating documents — often, a separate one for each step — and many meetings. To hasten the process simply and securely, use automation.
Traditional control environments used to be based on: | In your environment, we will help you consider the following: |
---|---|
Separate development, test, support, and release management teams established clear segregation of duties. | Automated DevOps pipelines (with no “hard stop” for manual change approval) require all controls to be automated — with no ability to circumvent controls via elevated access. |
Manual release management and change approvals ensured a robust review of readiness, approvals, and test evidence before code was promoted to production. | Automated DevOps pipelines (with no “hard stop” for manual change approval) require all controls to be automated — with no ability to circumvent controls via elevated access. |
Project and software development toolkits attracted low (or no) regulatory and audit scrutiny. | Each element in a CI/CD pipeline may now be an “in-scope system” requiring its own overlay of governance, security, controls, and change management. |
Delineating a subset of systems as “in-scope” for heightened scrutiny (e.g., SOX) meant others could operate with lower scrutiny. | Microservices architectures mean that small changes can affect multiple systems — including some “in-scope”. You will need to carefully decide whether your strategy is to maintain a precise record of “in-scope” versus “out-of-scope”, or decide that all are “in-scope”. |
Familiar (lengthy) documentation captured evidence of business, functional, and technical requirements, as well as testing and approvals. | Agile and DevOps-native sources of evidence should be agreed, codified, and made known to teams so the right information is retained and available for audit. |
Automating change management lets you shift your vision from the tactical, which focuses on individual approvals to the expansive, which considers and controls the entire change process so that you know it’s always working as it should. To ensure that you’re compliant and reduce your risks, however, you’ll need to make sure that your automation technology as well as the rules, tools and data it uses are reliable. Then, you can proceed with confidence that your results will be reliable, too, and always compliant. In short: you need to shift to continuous compliance.
First, make a list of all possible tools, process flows, and combinations. Next, document a baseline for each tool’s configuration, rulesets, administration processes, role-based access, etc.
Knowing that compliant changes can follow the pipeline (gathering necessary review, quality checks and approvals) isn’t enough: they have to follow it.
Here are steps you can take to ensure that your DevOps change-approval pipeline is iron-clad:
Implement a continuous compliance monitoring tool that provides real-time confirmation (and audit trails) that your pipeline is controlled and compliant.
Cybersecurity and Privacy solutions