free counter

How development data security operations can benefit the enterprise

Shot of several programmers working together on some type of computer code during the night

Were you struggling to attend Transform 2022? Have a look at all the summit sessions inside our on-demand library now! Watch here.

For all those technologists anxious to maintain with the most recent relevant acronyms, add development data security operations (DevDataSecOps) to the set of need-to-know.

DevDataSecOps builds on the popular terms devops and dataops. As the term isn’t yet in wide use, data practices at many organizations suggest it soon will undoubtedly be.

Increasingly, we have been seeing a dependence on organizations to go to a DevDataSecOps model that encompasses the core of the devops model, while like the critical security and data decisions that drive operation and development decisions, Karthik Ranganathan, CTO and cofounder at Yugabyte, told VentureBeat. While a DevDataSecOps approach may feel unfortable initially and include initial challenges (as devops did), we believe it includes big benefits that data-first organizations can’t ignore.

Whats the big deal about DevDataSecOps?

What’s driving this new trend?


MetaBeat 2022

MetaBeat provides together thought leaders to provide help with how metaverse technology will transform just how all industries communicate and conduct business on October 4 in SAN FRANCISCO BAY AREA, CA.

Register Here

To become a highly effective data-driven business, it is very important set up a solid foundation for the info architecture upfront, Ranganathan says. As businesses evolve to meet up the requirements of distributed workers, partners and customers, they can not build modern applications offering the required user experience with a legacy method of data. Distributed users require distributed data. Attempting to change the info layer after building a credit card applicatoin results in reduced developer productivity and slower time and energy to value.

Furthermore, Ranganathan stressed that employed in modern environments where being highly secure from day one is vital, security can’t be an afterthought. In the same way the info architecture is crucial to how a credit card applicatoin is builtand what experiences and capabilities can be expected the very same holds true for security.

By embracing DevDataSecOps practices, data and security architectures are named integral elements of building and rolling out services instead of specialized or expert aspects, Ranganathan said. This permits teams to recognize key requirements and thoughtfully make holistic design decisions during planning phases to guarantee the key objectives of the service could be met.

The effect is that IT groups face fewer surprises and blockers to building and shipping new features because of major re-architectures.

DevDataSecOps would additionally require upfront investment into these areas. Which means that IT groups would have to take a bit more time and energy to plan and architect in advance to make the later development and testing processes, which are often more expensive and time-consuming, more lucrative, Ranganathan said.

Great things about a DevDataSecOps strategy

Just as devops brought developer skills and insights into operations teams, DevDataSecOps would enable organizations to create similar bridges to data architects also to information security teams, Ranganathan believes.

By creating natural times for when and just why the teams should interact, and establishing shared objectives for the development of new services or capabilities, the outcome should raise the likelihood of meeting all of the goals of an initiative, Ranganathan said. The end-to-end approach should raise the efficiency of the developer teams by giving them all certain requirements upfront and minimizing major rework later along the way.

When done right, some key gains to be realized are:

  • Faster time and energy to value by firmly taking a little hit upfront but greatly reducing the opportunity of major delays down the road in the project.
  • Increase developer productivity by maintaining concentrate on value-added efforts and ensuring the proper data and security architectures are accustomed to minimize unnecessary churn and work.
  • Decreased risk insurance firms core needs of data and security established as a foundational component of any project, versus an add-on thought where it becomes harder to make sure full compliance or address all of the needs correctly.

Cultural change will undoubtedly be an obstacle

Despite these potential gains, adopting a DevDataSecOps strategy isn’t without its challenges.

Once we saw with the adoption of devops, the major challenge that may include DevDataSecOps is making the cultural change and training teams to get a holistic, end-to-end approach, Ranganathan explained. Although some inefficiencies may exist initially as new processes are established and extra voices become area of the early design phases, as time passes the entire key requirements and needs will undoubtedly be better understood by the bigger organization in order that smarter decisions and approaches are proposed right away.

Most IT teams, especially at larger organizations, would should also use other outside teams to create the required expertise and establish the correct processes for reviewing data and security requirements, Ranganathan said.

For the time being, many leading organizations have previously started down the road to DevDataSecOps adoption, even though they dont recognize it.

As the DevDataSecOps term isn’t widely embraced yet (and is really a mouthful to state), the truth is that lots of forward-looking organizations that rely heavily on data to power their business, such as for example large finance institutions and retailers, already are prioritizing their data and security architectures as fundamental elements of their business, Ranganathan said.

VentureBeat’s mission is usually to be an electronic town square for technical decision-makers to get understanding of transformative enterprise technology and transact. Discover our Briefings.

Read More

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker