Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Rolling out wide organization policies

Rolling out wide organization policies

In cloud-native era, security shifts left into SDLC to produce secure software by default. Yet, robust security policies are vital to safeguard outcomes. Join us to explore strategies for seamless, scalable security policy implementation that don’t break builds nor deploys. In the Cloud-Native handbook, security teams are no longer gatekeepers but enablers. The shift-left movement emphasizes embedding a security mindset early in the software development lifecycle, contrasting with traditional approaches where enforcing security policies at the end of development often creates delays and friction between engineering and security teams. However, someone must still guard the gate, and robust security policies are essential to ensure secure and deterministic outcomes. The challenge lies in achieving this without disrupting workflows or introducing unnecessary friction. In this talk, we will explore patterns and strategies for implementing organization-wide security policies effectively. Additionally, we will share lessons learned from rolling out these policies in large-scale organizations.

Avatar for José Carlos Chávez

José Carlos Chávez

June 06, 2025
Tweet

More Decks by José Carlos Chávez

Transcript

  1. © Okta and/or its affiliates. All rights reserved. © Okta

    and/or its affiliates. All rights reserved. Rolling Out Wide Organization Security Policies José Carlos Chávez Security Software Engineer @ Okta DevTalks Romania 2025 Bucharest
  2. © Okta and/or its affiliates. All rights reserved. José Carlos

    Chávez Security Software Engineer - Okta • Open Source contributor and maintainer for 10+ years • OWASP Coraza WAF co-leader • Loving father of 2 • Mathematician in quarantine
  3. © Okta and/or its affiliates. All rights reserved. Rules Expectations

    Approach Confidentiality Integrity Availability Why Security Policies Matter? Actionable Secure
  4. © Okta and/or its affiliates. All rights reserved. Why Security

    Policies Matter to your business? • Growing threats: Data breaches, zero-day exploits, ransomware, IP theft • Regulatory compliance: GDPR, SOC2, PCI DSS, ISO 27001, EO 14028 • Customer trust, reputation and contractual obligations • Scalable security foundations for growth
  5. © Okta and/or its affiliates. All rights reserved. Policy Development

    Framework • Identify Risks: Threat modeling and risk assessments • Stakeholder Involvement: Legal, IT, Engineering, DevOps, Product • Align with Standards: NIST, ISO 27001, CIS Controls • Tailor to Context: Languages, tools, pipelines and platforms • Review & Approve: Legal and executive buy-in
  6. © Okta and/or its affiliates. All rights reserved. Phase 1:

    Assessment & Planning - Baseline security posture - Gap analysis vs. desired state Phase 2: Pilot - Test policies in one team or department - Gather feedback and refine policies & mechanisms Phase 3: Organization-Wide Rollout - Clear timelines and communication in advance - Integrate with onboarding and standard operating procedure (SOP) - Progressive rollout first in audit mode and later in enforcement mode - Gather feedback and refine policies & mechanisms Phase 4: Continuous Monitoring - Policy violations - Automated alerts and audits - Gather feedback and refine policies & mechanisms Rollout strategy 󰛟
  7. © Okta and/or its affiliates. All rights reserved. Key Challenges

    • Lack of awareness • Resistance to change among teams • Balancing security and productivity. • Lack of tooling & automations • Keeping policies up to date with fast-changing tech • Enforcing policies across cloud, remote teams, DevOps without disruptions
  8. © Okta and/or its affiliates. All rights reserved. “Be a

    security enabler not a gatekeeper” Someone I work with
  9. © Okta and/or its affiliates. All rights reserved. 1. Shift

    left for policies Embed security policies as part of the SDLC through automation: a. Build-time policies should be evaluated on CI e.g. test, lint, SCA, signed commits, etc. b. Release policies should be evaluated on CD e.g. SCA, signed images, SBOM, etc. c. Run-time policies should be built and provisioned as IaC if possible e.g. OPA policies, K8s VAPs, RBAC, WAF rules, mTLS, etc. d. IT policies should be automatically deployed across devices. Tooling must be auto updated. e. Whenever introducing policies, do it following the SDLC not as an alien procedure.
  10. © Okta and/or its affiliates. All rights reserved. 2. P

    ~ NP (in security) If you understand the problem you are likely capable to fix it: • Leverage automation to propose a complying fix when possible • Anticipate the compliance before rolling out the policy • If you are not part of the solution then you are part of the problem
  11. © Okta and/or its affiliates. All rights reserved. 3. Tooling,

    Training & Awareness • Security onboarding for new hires • Monthly training or gamified exercises • Internal security champions program • Runbooks and troubleshooting guides to fix broken flows during policy enforcement All of the above only works if it is supported by tooling and automations that empower engineering teams.
  12. © Okta and/or its affiliates. All rights reserved. Measuring Success

    • Time and effort to adopt a policy • Compliance KPIs e.g. % coverage of controls, patch SLAs, tickets volume for policy violations • Incident reduction rate, quantifiable risks • Audit readiness and scores • Spread success stories: present incidents we were not involved thanks to our security policies
  13. © Okta and/or its affiliates. All rights reserved. Conclusions 1.

    Make security a culture, not a checklist 2. Involve engineering early in policy design 3. Use tools and automation wherever it is possible 4. Iterate frequently, follow the data and be prepared for changes 5. Shift left
  14. © Okta and/or its affiliates. All rights reserved. Questions? ©

    Okta and/or its affiliates. All rights reserved. You can also reach me at • [email protected] • https://www.linkedin.com/in/jcchavezs/ • https://jcchavezs.bsky.social
  15. © Okta and/or its affiliates. All rights reserved. Thank you!

    © Okta and/or its affiliates. All rights reserved.
  16. © Okta and/or its affiliates. All rights reserved. The good

    policy • Accountability • Consistency • Effectiveness • Practicality • Credibility:
  17. © Okta and/or its affiliates. All rights reserved. Tools &

    Technology • IAM: Okta, Azure AD • Endpoint Protection: CrowdStrike, SentinelOne • Code Security: Snyk, GitHub Advanced Security, SonarQube • SIEM: Splunk, ELK Stack • Policy Enforcement: OPA, Gatekeeper, Terraform Sentinel @jcchavezs