SlideShare a Scribd company logo
Shannon Lietz - @devsecops
James Wickett - @wickett
-- FOUNDER --
Shannon Lietz (@devsecops)
2
James Wickett (@wickett)
●
●
●
@devsecops || @wickett3
●
●
●
4
@devsecsops || @wickett5
6 @devsecsops || @wickett
“
massive computer-related attacks
@devsecops || @wickett7
- Steven Bellovin, Thinking Security
8
Adversary Perspective
@devsecsops || @wickett9
Motives
OpportunitiesMeans
@devsecops || @wickett10
DevSecOps: Finding the Adversaries in our Midst
1) understand
2) measure
3) correct continuously
@devsecops || @wickett12
HONEY SCANNERS DETECTION
@devsecops || @wickett13
DevSecOps: Finding the Adversaries in our Midst
@devsecops || @wickett15
Deployment Architecture
Component Manifest
Lines of Code
Tests Applied
@devsecops || @wickett16
@devsecops || @wickett17
@devsecops || @wickett18
“We can see requests getting blocked but we don't
know why. The samples just show the Ruleset name
and not the actual reason for blocking the requests.”
– Anonymous WAF User
@devsecops || @wickett19
OWASP TOP 10 App Sec Risks Real-World Top 10 Attacks
1 Injection Direct Object Reference
2 Broken Authentication Forceful Browsing
3 Sensitive Data Exposure Null Byte Attack
4 XML External Exposures (XXE) Command Injection
5 Broken Access Control Feature Abuse
6 Security Misconfiguration Evasion Techniques
7 Cross Site Scripting Subdomain Takeover
8 Insecure Deserialization Misconfiguration
9 Using Components with Known Vulnerabilities Cross Site Scripting
10 Insufficient Logging/Monitoring SQL Injection
@devsecops || @wickett20
Researchers Paid Noise
Advanced
Adversaries
Scanners
@devsecops || @wickett21
Fame /
Payment
Continuous
Payment
Control /
Payment
Information
Brokerage
@devsecops || @wickett22
OWASP Top 10
Advanced Adversaries
%
Perceived
Success
Number of
Adversaries
+ IPs
Scanners
Researchers
Paid Noise
@devsecops || @wickett23
OWASP Top Ten is just
the most recognized
part of the Problem
You Can’t Secure
New App Tech w/
Legacy AppSec
Account Takeover
Direct Object Reference
Forceful Browsing
Feature Abuse
Evasion Techniques
Subdomain Takeover
Misconfiguration
• Legacy WAFs focus on the
same threats as 15 years ago
• False positives result from generic
signatures without context
• Rarely used in blocking mode
OWASP Injection
Attacks
Real-World Problems
@devsecops || @wickett25
@devsecops || @wickett26
@devsecops || @wickett27
@devsecops || @wickett28
whitelist themselves
don’t use commercial scanners
“goto” TTPs
cryptocurrency
AI/ML
hide
@devsecops || @wickett29
30
31
Every application is different
@devsecops || @wickett
@devsecops || @wickett32
@devsecops || @wickett33
@devsecops || @wickett34
@devsecops || @wickett35
Return Rate
Rate of Change
Cost of fix
Mean Time to Identification
@devsecops || @wickett36
@devsecops || @wickett37
Time
Changes
Security Tests
@devsecops || @wickett38
DevSecOps: Finding the Adversaries in our Midst
• …
•
…
@devsecops || @wickett40
@devsecops || @wickett41
@devsecops || @wickett42
@devsecsops || @wickett43
@devsecsops || @wickett44
Crawl
Walk
Run
@devsecops || @wickett45
46
Free eBook!
info.signalsciences.com/book

More Related Content

What's hot (20)

PDF
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
PDF
The Emergent Cloud Security Toolchain for CI/CD
James Wickett
 
PDF
DevSecOps What Why and How
NotSoSecure Global Services
 
PDF
Adversary Driven Defense in the Real World
James Wickett
 
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
PDF
Talk DevSecOps to me
Michelle Ribeiro
 
PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Erkang Zheng
 
PDF
Release Your Inner DevSecOp
James Wickett
 
PPTX
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
PPTX
DevSecOps reference architectures 2018
Sonatype
 
PPTX
DevSecOps without DevOps is Just Security
Kevin Fealey
 
PDF
Serverless Security: A How-to Guide @ SnowFROC 2019
James Wickett
 
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
PPTX
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
PDF
Barriers to Container Security and How to Overcome Them
WhiteSource
 
PDF
Introduction to DevSecOps
Setu Parimi
 
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
Rich Mills
 
PPTX
How to Get Started with DevSecOps
CYBRIC
 
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
The Emergent Cloud Security Toolchain for CI/CD
James Wickett
 
DevSecOps What Why and How
NotSoSecure Global Services
 
Adversary Driven Defense in the Real World
James Wickett
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Mohamed Nizzad
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Talk DevSecOps to me
Michelle Ribeiro
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Erkang Zheng
 
Release Your Inner DevSecOp
James Wickett
 
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
DevSecOps reference architectures 2018
Sonatype
 
DevSecOps without DevOps is Just Security
Kevin Fealey
 
Serverless Security: A How-to Guide @ SnowFROC 2019
James Wickett
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Mohammed A. Imran
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Barriers to Container Security and How to Overcome Them
WhiteSource
 
Introduction to DevSecOps
Setu Parimi
 
DevSecOps: essential tooling to enable continuous security 2019-09-16
Rich Mills
 
How to Get Started with DevSecOps
CYBRIC
 

Similar to DevSecOps: Finding the Adversaries in our Midst (20)

PDF
swampUP - 2018 - The Divine and Felonious Nature of Cyber Security
John Willis
 
PDF
Protection and Verification of Security Design Flaws
Hdiv Security
 
PDF
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon
 
PDF
Clean Architecture Essentials - Stockholm Software Craftsmanship
Ivan Paulovich
 
PPTX
Performance Metrics Driven CI/CD - Introduction to Continuous Innovation and ...
Mike Villiger
 
PDF
The Seven Habits of the Highly Effective DevSecOp
James Wickett
 
PPTX
OWASP Top 10.pptx for latest security lapses in applications
sanjeev2k
 
PDF
Clean Architecture Essentials @ivanpaulovich
Ivan Paulovich
 
PDF
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
PPTX
DevOpsGuys FutureDecoded 2016 - is DevOps the Answer
DevOpsGroup
 
PDF
Epistemological Problem of Application Security
James Wickett
 
PPTX
Owasp top 10 Vulnerabilities by cyberops infosec
Cyberops Infosec LLP
 
PDF
OWASP Top 10 2007 for JavaEE
Magno Logan
 
PDF
Trusting Your Ingredients - What Building Software And Cheesecake Have In Common
Leon Stigter
 
PDF
Application Security Epistemology in a Continuous Delivery World
James Wickett
 
PDF
OWASP top10 2017, Montpellier JUG de Noel
Hubert Gregoire
 
PDF
Lessons from the Trenches: Building an API-Centric Architecture
WSO2
 
PPTX
Getting CI right for SQL Server
Alex Yates
 
PDF
Meetup DotNetCode Owasp
dotnetcode
 
PPTX
Visual Studio | Lanzamiento VS2017 en Buenos Aires - 11/03/2017
Pablo Ariel Di Loreto
 
swampUP - 2018 - The Divine and Felonious Nature of Cyber Security
John Willis
 
Protection and Verification of Security Design Flaws
Hdiv Security
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon
 
Clean Architecture Essentials - Stockholm Software Craftsmanship
Ivan Paulovich
 
Performance Metrics Driven CI/CD - Introduction to Continuous Innovation and ...
Mike Villiger
 
The Seven Habits of the Highly Effective DevSecOp
James Wickett
 
OWASP Top 10.pptx for latest security lapses in applications
sanjeev2k
 
Clean Architecture Essentials @ivanpaulovich
Ivan Paulovich
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
James Wickett
 
DevOpsGuys FutureDecoded 2016 - is DevOps the Answer
DevOpsGroup
 
Epistemological Problem of Application Security
James Wickett
 
Owasp top 10 Vulnerabilities by cyberops infosec
Cyberops Infosec LLP
 
OWASP Top 10 2007 for JavaEE
Magno Logan
 
Trusting Your Ingredients - What Building Software And Cheesecake Have In Common
Leon Stigter
 
Application Security Epistemology in a Continuous Delivery World
James Wickett
 
OWASP top10 2017, Montpellier JUG de Noel
Hubert Gregoire
 
Lessons from the Trenches: Building an API-Centric Architecture
WSO2
 
Getting CI right for SQL Server
Alex Yates
 
Meetup DotNetCode Owasp
dotnetcode
 
Visual Studio | Lanzamiento VS2017 en Buenos Aires - 11/03/2017
Pablo Ariel Di Loreto
 
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
PPTX
Vulnerability Discovery in the Cloud
DevOps.com
 
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
PDF
A New Year’s Ransomware Resolution
DevOps.com
 
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
PDF
Don't Panic! Effective Incident Response
DevOps.com
 
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
PDF
Monitoring Serverless Applications with Datadog
DevOps.com
 
PDF
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
PPTX
Securing medical apps in the age of covid final
DevOps.com
 
PDF
How to Build a Healthy On-Call Culture
DevOps.com
 
PPTX
The Evolving Role of the Developer in 2021
DevOps.com
 
PDF
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
PPTX
Secure Data Sharing in OpenShift Environments
DevOps.com
 
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
Vulnerability Discovery in the Cloud
DevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
A New Year’s Ransomware Resolution
DevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Don't Panic! Effective Incident Response
DevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
Monitoring Serverless Applications with Datadog
DevOps.com
 
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
Securing medical apps in the age of covid final
DevOps.com
 
How to Build a Healthy On-Call Culture
DevOps.com
 
The Evolving Role of the Developer in 2021
DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
Secure Data Sharing in OpenShift Environments
DevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 
Ad

Recently uploaded (20)

PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
PDF
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Cristian Garcia G.
 
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PDF
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
PDF
UiPath Agentic AI ile Akıllı Otomasyonun Yeni Çağı
UiPathCommunity
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
PPTX
reInforce 2025 Lightning Talk - Scott Francis.pptx
ScottFrancis51
 
PDF
Python Conference Singapore - 19 Jun 2025
ninefyi
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
 
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Cristian Garcia G.
 
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
Practical Applications of AI in Local Government
OnBoard
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Agentic AI ile Akıllı Otomasyonun Yeni Çağı
UiPathCommunity
 
Kubernetes - Architecture & Components.pdf
geethak285
 
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
reInforce 2025 Lightning Talk - Scott Francis.pptx
ScottFrancis51
 
Python Conference Singapore - 19 Jun 2025
ninefyi
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
 

DevSecOps: Finding the Adversaries in our Midst