SlideShare a Scribd company logo
Design, develop, deploy and run
secure applications​
Mark Harrison – Microsoft, Azure AppDev Specialist
Nick Liffen – GitHub, Security Specialist
Agenda Application security fundamentals
GitHub Advanced Security capabilities
Information Security
Confidentiality, integrity and
availability are the basic concepts
and at the core of infosec efforts
Protect applications and
associated data
Attackers – internal / external
Accidents / incompetence
Natural disasters
Cybercrime
Huge industry
Attacker’s Advantage…
…and Defender’s dilemma
Attacker only needs one weak point
Attacker can probe for unknown vulnerabilities
Attacker can strike at will
Attacker can play dirty
Defender must defend all points
Defender must defend against known attacks
Defender must be constantly vigilant
Defender must play by the rules
There are huge numbers of attackers
Risk Management
Identify Risks
Likelihood of being exercised
Impact that it will cause
Address risk:
Avoid
Mitigate
Transfer
Accept
Reduce risks by:
Secure by design
Secure the code
Secure the environment
Secure the operations
Secure the App
Secure by Design
Threat Modeling
Zero Trust
User least privileged access
Verify explicitly
Assume breach
Identity
Data Classification
Transport & Storage
Secure the Code Secure the Environment Secure the Operations
Secure the App
Secure by Design Secure the Code
Secret Management
Code Management
Code Quality
Dependency Management
Static Analysis
Secure the Environment Secure the Operations
Secure the App
Secure by Design Secure the Code Secure the Environment
Policies
Infrastructure as code
Access Controls
Network
OS Patching
Secure the Operations
Secure the App
Secure by Design Secure the Code Secure the Environment Secure the Operations
Monitoring
Telemetry & Audits
Incident Management
Forensics
Threat intelligence
Disaster Recovery
Secure the App
Secure by Design Secure the Code Secure the Environment Secure the Operations
Automation where possible - Embrace everything-as-code
Software Supply Chain
Open Source
Potentially many levels of dependencies resulting in a lot
of software being used from unknown sources
Dependency Risks
Software vulnerabilities – what flaws/bugs have you
inherited into your application?
New version – is it compatible with your application?
Licensing constraints – it is allowed for commercial use?
What must you share back?
Understand your SBOM (Software Bill
of Materials)
Software Composition Analysis tools
DevOps
Driving innovation – reduce time to value
Develop, deploy and improve products at a
faster pace than they can with traditional
software development approaches
The union of people, process, and products
to enable continuous delivery of value
Production
Development
Develop
+Test
Monitor
+ learn
Collaboration
Plan
Build + Release
Requirements /
Work Items
Security
Shift Left
DevSecOps
Security practises should be automated and
baked into DevOps in a pervasive manner
Shift left – introduce security earlier into the
dev lifecycle
Security first culture
Production
Development
Develop
+Test
Monitor
+ learn
Collaboration
Plan
Build + Release
Requirements /
Work Items
GitHub Advanced Security capabilities
GitHub Code Scanning
The interrogatable tool that provides the world
class developer experience developers expect when
it comes to consuming security & quality alerts
CodeQL
CodeQL is the analysis engine used by developers
to automate security checks, and by security
researchers to perform variant analysis
GitHub Secret Scanning
Automatic notifications of any API tokens or other
secrets exposed anywhere in your git history
GitHub Security Overview
A single pane of glass for everything security in,
and out of GitHub
GitHub Supply Chain (Dependency Review)
Dependency review helps you understand
dependency changes and the security impact of
these changes at every pull request. It provides an
easily understandable visualization of dependency
changes with a rich diff on the "Files Changed" tab
of a pull request
GitHub Advanced Security capabilities
Demo Time
Resources
Session specific resources
Azure Security Documentation​
👉https://aka.ms/build/uk/azure-security
GitHub Security
👉https://aka.ms/build/uk/github-security
General learning resources
Microsoft Learn
👉 https://aka.ms/build/uk/learn
Microsoft Docs
👉 https://aka.ms/build/uk/docs
Microsoft Build Cloud Skills Challenge​
👉 https://aka.ms/build/uk/csc
Microsoft Certifications​
👉 https://aka.ms/build/uk/certs
Microsoft UK Training Days​
👉 https://aka.ms/build/uk/training
Microsoft UK Developer Hub​
👉 https://aka.ms/build/uk/developers
Microsoft UK Community Map​
👉 https://aka.ms/build/uk/community
Thank you
mark.harrison@microsoft.com
nickliffen@github.com
© Copyright Microsoft Corporation. All rights reserved.
Securing Applications

More Related Content

PPTX
The DevSecOps Advantage: A Comprehensive Guide
Dev Software
 
PPTX
How not to fall into the DevSecOps trap
Matteo Emili
 
PDF
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
PPTX
Forget cyber, it's all about AppSec
Adrien de Beaupre
 
PDF
AppSec in an Agile World
David Lindner
 
PPTX
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
PPTX
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
PPTX
DevSecOps - automating security
John Staveley
 
The DevSecOps Advantage: A Comprehensive Guide
Dev Software
 
How not to fall into the DevSecOps trap
Matteo Emili
 
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
Forget cyber, it's all about AppSec
Adrien de Beaupre
 
AppSec in an Agile World
David Lindner
 
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
DevSecOps - automating security
John Staveley
 

Similar to Securing Applications (20)

PDF
Secure Software Ecosystem Teqnation 2024
Soroosh Khodami
 
PPT
Software Security in the Real World
Mark Curphey
 
PPTX
DevSecOps : an Introduction
Prashanth B. P.
 
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PDF
Agile Application Security Enabling Security in a Continuous Delivery Pipelin...
piggsadamiso
 
PDF
The complete guide to developer first application security By Github.Com
darelinornes
 
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
lior mazor
 
PDF
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
PPTX
Azure Security Compass v1.1 - Presentation.pptx
ZaheerEbrahim5
 
PDF
The Evolution of Cybersecurity in Software Development for 2025
ScalaCode
 
PDF
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
PPTX
Turning security into code by Jeff Williams
DevSecCon
 
PDF
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
Duran Hsieh
 
PPTX
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
 
PDF
DevSecOps Security: Is it Necessary?
Enov8
 
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
PDF
Secure Your Code Implement DevSecOps in Azure
kloia
 
PPTX
AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui
ellan12
 
PPTX
DevSecOps Powerpoint Presentation for Students
poonawala2303
 
Secure Software Ecosystem Teqnation 2024
Soroosh Khodami
 
Software Security in the Real World
Mark Curphey
 
DevSecOps : an Introduction
Prashanth B. P.
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Introduction to DevSecOps
abhimanyubhogwan
 
Agile Application Security Enabling Security in a Continuous Delivery Pipelin...
piggsadamiso
 
The complete guide to developer first application security By Github.Com
darelinornes
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
lior mazor
 
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
Azure Security Compass v1.1 - Presentation.pptx
ZaheerEbrahim5
 
The Evolution of Cybersecurity in Software Development for 2025
ScalaCode
 
Complete DevSecOps handbook_ Key differences, tools, benefits & best practice...
mohitd6
 
Turning security into code by Jeff Williams
DevSecCon
 
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
Duran Hsieh
 
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
 
DevSecOps Security: Is it Necessary?
Enov8
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
Secure Your Code Implement DevSecOps in Azure
kloia
 
AddingtheSecToDevOpsBSides (1).pptx for Bsides Nairobi 22 with Joylynn Kirui
ellan12
 
DevSecOps Powerpoint Presentation for Students
poonawala2303
 
Ad

Recently uploaded (20)

PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Software Development Methodologies in 2025
KodekX
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
The Future of Artificial Intelligence (AI)
Mukul
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Ad

Securing Applications

  • 1. Design, develop, deploy and run secure applications​ Mark Harrison – Microsoft, Azure AppDev Specialist Nick Liffen – GitHub, Security Specialist
  • 2. Agenda Application security fundamentals GitHub Advanced Security capabilities
  • 3. Information Security Confidentiality, integrity and availability are the basic concepts and at the core of infosec efforts Protect applications and associated data Attackers – internal / external Accidents / incompetence Natural disasters
  • 4. Cybercrime Huge industry Attacker’s Advantage… …and Defender’s dilemma Attacker only needs one weak point Attacker can probe for unknown vulnerabilities Attacker can strike at will Attacker can play dirty Defender must defend all points Defender must defend against known attacks Defender must be constantly vigilant Defender must play by the rules There are huge numbers of attackers
  • 5. Risk Management Identify Risks Likelihood of being exercised Impact that it will cause Address risk: Avoid Mitigate Transfer Accept Reduce risks by: Secure by design Secure the code Secure the environment Secure the operations
  • 6. Secure the App Secure by Design Threat Modeling Zero Trust User least privileged access Verify explicitly Assume breach Identity Data Classification Transport & Storage Secure the Code Secure the Environment Secure the Operations
  • 7. Secure the App Secure by Design Secure the Code Secret Management Code Management Code Quality Dependency Management Static Analysis Secure the Environment Secure the Operations
  • 8. Secure the App Secure by Design Secure the Code Secure the Environment Policies Infrastructure as code Access Controls Network OS Patching Secure the Operations
  • 9. Secure the App Secure by Design Secure the Code Secure the Environment Secure the Operations Monitoring Telemetry & Audits Incident Management Forensics Threat intelligence Disaster Recovery
  • 10. Secure the App Secure by Design Secure the Code Secure the Environment Secure the Operations Automation where possible - Embrace everything-as-code
  • 11. Software Supply Chain Open Source Potentially many levels of dependencies resulting in a lot of software being used from unknown sources Dependency Risks Software vulnerabilities – what flaws/bugs have you inherited into your application? New version – is it compatible with your application? Licensing constraints – it is allowed for commercial use? What must you share back? Understand your SBOM (Software Bill of Materials) Software Composition Analysis tools
  • 12. DevOps Driving innovation – reduce time to value Develop, deploy and improve products at a faster pace than they can with traditional software development approaches The union of people, process, and products to enable continuous delivery of value Production Development Develop +Test Monitor + learn Collaboration Plan Build + Release Requirements / Work Items
  • 13. Security Shift Left DevSecOps Security practises should be automated and baked into DevOps in a pervasive manner Shift left – introduce security earlier into the dev lifecycle Security first culture Production Development Develop +Test Monitor + learn Collaboration Plan Build + Release Requirements / Work Items
  • 14. GitHub Advanced Security capabilities GitHub Code Scanning The interrogatable tool that provides the world class developer experience developers expect when it comes to consuming security & quality alerts CodeQL CodeQL is the analysis engine used by developers to automate security checks, and by security researchers to perform variant analysis GitHub Secret Scanning Automatic notifications of any API tokens or other secrets exposed anywhere in your git history GitHub Security Overview A single pane of glass for everything security in, and out of GitHub GitHub Supply Chain (Dependency Review) Dependency review helps you understand dependency changes and the security impact of these changes at every pull request. It provides an easily understandable visualization of dependency changes with a rich diff on the "Files Changed" tab of a pull request
  • 15. GitHub Advanced Security capabilities Demo Time
  • 16. Resources Session specific resources Azure Security Documentation​ 👉https://aka.ms/build/uk/azure-security GitHub Security 👉https://aka.ms/build/uk/github-security General learning resources Microsoft Learn 👉 https://aka.ms/build/uk/learn Microsoft Docs 👉 https://aka.ms/build/uk/docs Microsoft Build Cloud Skills Challenge​ 👉 https://aka.ms/build/uk/csc Microsoft Certifications​ 👉 https://aka.ms/build/uk/certs Microsoft UK Training Days​ 👉 https://aka.ms/build/uk/training Microsoft UK Developer Hub​ 👉 https://aka.ms/build/uk/developers Microsoft UK Community Map​ 👉 https://aka.ms/build/uk/community
  • 18. © Copyright Microsoft Corporation. All rights reserved.