DevOps
Software

Sports App DevSecOps Discovery & Definition

Trility completed a discovery process for a sports performance video-based app to help them understand current logging and monitoring capabilities, provide a recommended path to mature those capabilities, and enable automated responses when possible – making it easier to meet customer security requirements.

Problem Statement

The client’s existing systems and solutions lack the logging, monitoring, and alerting capabilities to allow them to implement automated responses at the desired level. The current state also makes it difficult for the client and its team to have a complete understanding of risk level, in addition to gaps in security, governance, and compliance. As a result, the current state can make it difficult to demonstrate compliance with customer security requirements and make the security program expensive to scale.

Solution Approach

Using a Discovery process, Trility performed a full inventory and review of applications; logging, monitoring, and alerting capabilities; architecture; and security documentation. This approach allowed Trility to provide an evaluation of existing tools and how to most effectively deploy them with the recommended solution. 

Trility delivered recommendations for establishing security monitoring and logging capabilities inside the existing environment and helped build out the first step toward automated incident response capabilities.

Outcomes

The client received a final report with a recommended course of action for establishing robust logging and monitoring capabilities, cloud security architecture review, and enhanced software vulnerability scanning capabilities. Taking these steps, the client was able to align security with the architecture team and proactively make decisions to retain and increase its client base.  

The logging and mitigation evaluation identified an overall security rating and maturity level. Areas of improvement were included to facilitate correlation processing to find indicators of attack and indicators of compromise. The recommended solution leverages automation to reduce the need for human intervention, increasing scalability and reducing cost.

The client also received recommendations for reducing the extra cost of data aggregation.

Project Attributes

  • Reduced Risk
  • Increased Automation
  • Increased Capabilities
  • Increased Security
  • Documentation

Technologies Used

  • Sumo Logic
  • SentinelOne
  • Wiz
  • AWS CloudWatch
  • AWS SecurityHub
  • AWS CloudTrail