SlideShare a Scribd company logo
Efforts in Scaling Application
Security Programs
July 26, 2018
• Eric Fay
• Scrantonian in Santa Monica
– {Insert Office reference here}
• Manager of AppSec @ Hulu
• Former InfoSec @ Dow Jones
whoami
• Retrospective of starting and growing an
application security program
• Timeline
– 2014 - Yesterday
• Broken into loose phases
– Open Pastures
– Expansion
– Maturing
– Future
Agenda
Phase 1 - Open Pastures
~2014
• Smart engineers
• No full time AppSec
• Agile development processes
– Deploy everything, everywhere,
anytime, always.
• Mostly monolithic applications
• Free Video-On-Demand (FVOD)
• Subscription Video-On-Demand
(SVOD)
P1 - Landscape
• Learn the lay of the land
• Determine most business critical
workflows
• Focus risk/vuln identification on
those workflows
• Establish relationships with dev
teams.
P1 - Goals
• Met with dev leads and tech
leaders
• Learned architecture of services
• Manual & Automated security
testing on critical workflows
• Acquired DAST tool
P1 - Actions Taken
• Dynamic Analysis will find some
low hanging fruit with little effort.
• Establishing connections with
development leads is invaluable.
• Success criteria for tools is
drastically different than it is today
P1 - Lessons Learned
Phase 2 - Expansion
• Familiar with critical apps &
services
• Identified & mitigated immediate
risks
• You are now the security goto for
some teams.
• 1-2 full time AppSec
• Have baseline scanning tools
• Teams are beginning to move to
microservice architecture
• FVOD
• SVOD
• No-ADs SVOD
• Addons
P2 - Landscape
• Create tools to automate
processes
• Expand tool coverage
• Security in SDLC
• Secure code education
P2 - Goals
• Acquired RASP tool
• Started Bug Bounty program
• Automatic static code scanning for
Rails (BrakeyBrake)
• Monitoring TLS health
(HowsMyTLS)
• Monitoring external surface
(ExternalExposure)
• S3 access control monitoring
(LeakyBuckets)
• Held internal security talks
P2 - Actions Taken
• RASP was a high effort, low return.
• Monitoring tools that were built
allowed us to automate away
manual work and begin to track
metrics.
• Bug bounty provided an immediate
return
• Focused talks with individual
teams was valuable
P2 - Lessons learned
Phase 3 - Maturing
• 3-4 full time AppSec
• Teams moving to centralized
CI/CD processes
• Everything is microservice
• SVOD
• No-ADs SVOD
• Addons
• Live TV
P3 - Landscape
• Remediate classes of
vulnerabilities and org wide risk
• Get security further in the SDLC
• Increase team efficiencies
• Formalize security workflows &
processes
• Formalize security education
P3 - Goals
• Static code analysis in CI/CD
pipelines
• Security involvement into our
external exposure process
• Formalize security workflows
• Acquired WAF solution
• Acquired education content
• Content Security Policy
P3 - Actions Taken
• Static code CI/CD integration very
valuable
• Hooking into established
processes allowed lower friction
interactions
• Formalizing assessment
processes increased team
efficiencies
• WAF integration was a high return
• Formal education should have
been prioritized earlier
• CSP is hard to scale properly
P3 - Lessons Learned
Phase 4 - Future
• Automated vulnerability
exploitation detection
• Tighter security integrations in
SDLC
• Education Events
• Creation of security libraries for
development teams to enable
security in their development
frameworks.
• Pushing security as just another
consideration of development
teams
P4 - Potential
THANK YOU
● @icanhasfay
● /in/appsec

More Related Content

What's hot (20)

PDF
Applying formal methods to existing software by B.Monate
Mahaut Gouhier
 
PDF
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
PDF
Are Agile And Secure Development Mutually Exclusive?
Source Conference
 
PPTX
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
 
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
PPTX
Dev secops security and compliance at the speed of continuous delivery - owasp
Dag Rowe
 
PPTX
How to Get Started with DevSecOps
CYBRIC
 
PPTX
Key Findings from the 2019 State of DevOps Report
Puppet
 
PPTX
Application Security from the Inside Out
Ulisses Albuquerque
 
PPTX
Speeding Up Secure Software Development
Ulisses Albuquerque
 
PPTX
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
PDF
Flight East 2018 Presentation–Black Duck at Docusign
Synopsys Software Integrity Group
 
PDF
Container Security: What Enterprises Need to Know
DevOps.com
 
PPTX
Splitting The Check On Compliance and Security
New Relic
 
PDF
A Successful SAST Tool Implementation
Checkmarx
 
PPTX
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
WrikeTechClub
 
PDF
Flight East 2018 Presentation–Continuous Integration––An Overview
Synopsys Software Integrity Group
 
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
PPTX
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
PPTX
Stalled at the intersection of dev ops and security v2
matthewabq
 
Applying formal methods to existing software by B.Monate
Mahaut Gouhier
 
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
Are Agile And Secure Development Mutually Exclusive?
Source Conference
 
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
Dev secops security and compliance at the speed of continuous delivery - owasp
Dag Rowe
 
How to Get Started with DevSecOps
CYBRIC
 
Key Findings from the 2019 State of DevOps Report
Puppet
 
Application Security from the Inside Out
Ulisses Albuquerque
 
Speeding Up Secure Software Development
Ulisses Albuquerque
 
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
Flight East 2018 Presentation–Black Duck at Docusign
Synopsys Software Integrity Group
 
Container Security: What Enterprises Need to Know
DevOps.com
 
Splitting The Check On Compliance and Security
New Relic
 
A Successful SAST Tool Implementation
Checkmarx
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
WrikeTechClub
 
Flight East 2018 Presentation–Continuous Integration––An Overview
Synopsys Software Integrity Group
 
DevSecOps Training Bootcamp - A Practical DevSecOps Course
Tonex
 
DevSecOps-OWASP Indonesia Day 2017
Suman Sourav
 
Stalled at the intersection of dev ops and security v2
matthewabq
 

Similar to Efforts in Scaling Application Security Programs (20)

PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
PPTX
Digital Product Security
SoftServe
 
PDF
Journey to the center of DevOps - v6
Venkat Janardhanam, MS, MBA
 
PDF
A journey into Application Security
Christian Martorella
 
PDF
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24
 
PDF
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Brian Levine
 
PPT
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
PDF
How to Ensure SaaS App Security with DevOps.pdf
MadvITSolutions
 
PDF
AppSec in an Agile World
David Lindner
 
ODP
Making security-agile matt-tesauro
Matt Tesauro
 
PPTX
Secure DevOPS Implementation Guidance
Tej Luthra
 
PPTX
Cloud application security (CCSP Domain 4)
Amy Nicewick, CISSP, CCSP, CEH
 
PPTX
DevSecOps Story with added security controls
HareeshNani5
 
PDF
Testing in agile is it easier said than done
Archana Joshi
 
PDF
Archana Joshi Testing in agile is it easier said than done
Archana Joshi
 
PPTX
Null application security in an agile world
Stefan Streichsbier
 
PPTX
DevSecOps - It can change your life (cycle)
Qualitest
 
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
PDF
The Cloud is in the details webinar - Rothke
Ben Rothke
 
PPTX
C.3.1.E4 ICT404 Lecture Slides 5_A_cybersec.pptx
vamsikrishnasomayaju
 
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Digital Product Security
SoftServe
 
Journey to the center of DevOps - v6
Venkat Janardhanam, MS, MBA
 
A journey into Application Security
Christian Martorella
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Brian Levine
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
How to Ensure SaaS App Security with DevOps.pdf
MadvITSolutions
 
AppSec in an Agile World
David Lindner
 
Making security-agile matt-tesauro
Matt Tesauro
 
Secure DevOPS Implementation Guidance
Tej Luthra
 
Cloud application security (CCSP Domain 4)
Amy Nicewick, CISSP, CCSP, CEH
 
DevSecOps Story with added security controls
HareeshNani5
 
Testing in agile is it easier said than done
Archana Joshi
 
Archana Joshi Testing in agile is it easier said than done
Archana Joshi
 
Null application security in an agile world
Stefan Streichsbier
 
DevSecOps - It can change your life (cycle)
Qualitest
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
The Cloud is in the details webinar - Rothke
Ben Rothke
 
C.3.1.E4 ICT404 Lecture Slides 5_A_cybersec.pptx
vamsikrishnasomayaju
 
Ad

Recently uploaded (20)

PPTX
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
PPTX
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 
PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PDF
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
Simplify React app login with asgardeo-sdk
vaibhav289687
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
PDF
Everything you need to know about pricing & licensing Microsoft 365 Copilot f...
Q-Advise
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Simplify React app login with asgardeo-sdk
vaibhav289687
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
Everything you need to know about pricing & licensing Microsoft 365 Copilot f...
Q-Advise
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
Ad

Efforts in Scaling Application Security Programs

  • 1. Efforts in Scaling Application Security Programs July 26, 2018
  • 2. • Eric Fay • Scrantonian in Santa Monica – {Insert Office reference here} • Manager of AppSec @ Hulu • Former InfoSec @ Dow Jones whoami
  • 3. • Retrospective of starting and growing an application security program • Timeline – 2014 - Yesterday • Broken into loose phases – Open Pastures – Expansion – Maturing – Future Agenda
  • 4. Phase 1 - Open Pastures ~2014
  • 5. • Smart engineers • No full time AppSec • Agile development processes – Deploy everything, everywhere, anytime, always. • Mostly monolithic applications • Free Video-On-Demand (FVOD) • Subscription Video-On-Demand (SVOD) P1 - Landscape
  • 6. • Learn the lay of the land • Determine most business critical workflows • Focus risk/vuln identification on those workflows • Establish relationships with dev teams. P1 - Goals
  • 7. • Met with dev leads and tech leaders • Learned architecture of services • Manual & Automated security testing on critical workflows • Acquired DAST tool P1 - Actions Taken
  • 8. • Dynamic Analysis will find some low hanging fruit with little effort. • Establishing connections with development leads is invaluable. • Success criteria for tools is drastically different than it is today P1 - Lessons Learned
  • 9. Phase 2 - Expansion
  • 10. • Familiar with critical apps & services • Identified & mitigated immediate risks • You are now the security goto for some teams. • 1-2 full time AppSec • Have baseline scanning tools • Teams are beginning to move to microservice architecture • FVOD • SVOD • No-ADs SVOD • Addons P2 - Landscape
  • 11. • Create tools to automate processes • Expand tool coverage • Security in SDLC • Secure code education P2 - Goals
  • 12. • Acquired RASP tool • Started Bug Bounty program • Automatic static code scanning for Rails (BrakeyBrake) • Monitoring TLS health (HowsMyTLS) • Monitoring external surface (ExternalExposure) • S3 access control monitoring (LeakyBuckets) • Held internal security talks P2 - Actions Taken
  • 13. • RASP was a high effort, low return. • Monitoring tools that were built allowed us to automate away manual work and begin to track metrics. • Bug bounty provided an immediate return • Focused talks with individual teams was valuable P2 - Lessons learned
  • 14. Phase 3 - Maturing
  • 15. • 3-4 full time AppSec • Teams moving to centralized CI/CD processes • Everything is microservice • SVOD • No-ADs SVOD • Addons • Live TV P3 - Landscape
  • 16. • Remediate classes of vulnerabilities and org wide risk • Get security further in the SDLC • Increase team efficiencies • Formalize security workflows & processes • Formalize security education P3 - Goals
  • 17. • Static code analysis in CI/CD pipelines • Security involvement into our external exposure process • Formalize security workflows • Acquired WAF solution • Acquired education content • Content Security Policy P3 - Actions Taken
  • 18. • Static code CI/CD integration very valuable • Hooking into established processes allowed lower friction interactions • Formalizing assessment processes increased team efficiencies • WAF integration was a high return • Formal education should have been prioritized earlier • CSP is hard to scale properly P3 - Lessons Learned
  • 19. Phase 4 - Future
  • 20. • Automated vulnerability exploitation detection • Tighter security integrations in SDLC • Education Events • Creation of security libraries for development teams to enable security in their development frameworks. • Pushing security as just another consideration of development teams P4 - Potential