The document discusses Netflix's approach to proactive security. It outlines the challenges of securing a modern infrastructure with hundreds of applications and instances deploying code continuously. Netflix's solution is to implement proactive security controls that are integrated, automated, scalable and adaptive using tools like Monterey, Simian Army, Dirty Laundry, Security Monkey and Speedbump. The approach focuses on finding problems early, knowing weaknesses, monitoring for anomalies, collecting meaningful data, simplifying security for developers, reevaluating approaches, and sharing learnings with others.
Splitting the Check on Compliance and SecurityJason Chan
1) Developers prioritize speed and innovation while auditors focus on compliance and predictability. The resolution is adopting tools like Spinnaker that provide traceability in development pipelines to satisfy both groups.
2) Tools like Penguin allow continuous monitoring of application security risks across microservices rather than one-time assessments.
3) Compartmentalization through practices like tokenization and microservices limits the impact of breaches by restricting access on a need-to-know basis.
Just when you thought DevOps was the new black, along comes SecDevOps. In this webinar, Andrew Storms, Sr. Director of DevOps at CloudPassage and Alan Shimel Co-Founder of DevOps.com will discuss the emerging hybrid role of DevOps and Security. Tune in to hear them cover the following topics and why DevOps should want to play a bigger part in security:
Go beyond the traditional using DevOps tools, practices, methods to create a force multiplier of SecDevOps
Orchestrate and Automate - Deputize everyone to incorporate security into their day to day responsibilities
Examples of security automation, case situations minimizing risk and driving flexibility for DevOps
See how SaaS provider CloudPassage integrates security into its own development and operations workflows
This document discusses integrating DevOps and security by bringing development, operations, QA, and security teams together. It outlines where security currently stands, emphasizing the need to change from a "rugged" security model that acts as a bottleneck. The document proposes tactics to scale security through empathy, automation, and feedback loops. Specific tactics include integrating security into defect tracking, preventative controls, deployment pipelines, monitoring, and emphasizing that security says "we could do it this way" rather than only saying no. The overall goal is to improve security while making work easier.
Dev seccon london 2016 intelliment securityDevSecCon
This document discusses writing firewall policies in application manifests from a DevSecOps perspective. It describes how defining network and security requirements as code can help automate infrastructure delivery and reduce bottlenecks. The presenter advocates applying a "shift left" paradigm to define requirements early. A demo is outlined showing how Puppet can be used to define an application's network visibility needs, which are then automatically validated and deployed to firewalls by Intelliment for consistent security compliance across teams.
Netflix provides concise summaries of its cloud application security practices:
1. Netflix emphasizes integrating security controls into its engineering processes and tools to make security practices easy and self-service.
2. Netflix focuses on making secure options the easiest options by building security features directly into common tools like its cryptographic library and single sign-on system.
3. Netflix balances trust and verification through automated security tools that monitor configurations and detect vulnerabilities, notifying engineers of any issues found.
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
DevOpsSec applies DevOps principles like decentralization, shared resources, and transparency to security. It focuses on reducing the mean time to detect (MTTD) security issues and mean time to resolve (MTTR) them. Automating security testing and integrating it into continuous integration helps detect attacks and issues earlier. Treating security operations like other services improves culture.
You Build It, You Secure It: Introduction to DevSecOpsSumo Logic
In this presentation, DevOps and DevSecOps expert John Willis dives into how to implement DevSecOps, including:
- Why traditional DevOps has shifted and what this shift means
- How DevSecOps can change the game for your team
- Tips and tricks for getting DevSecOps started within your organization
This document discusses integrating security into DevOps practices. It notes that while DevOps embraces cloud automation and agility, security can slow things down. Traditional security approaches are ill-suited for cloud environments. The document introduces CloudPassage Halo as a security-as-a-service platform that provides automated security controls like firewall management, intrusion detection and vulnerability scanning across cloud infrastructure in a self-service manner. It also describes the CloudPassage Halo architecture and demostrates some of its features. Finally, it promotes the CloudPassage Halo API toolbox and offers six months of free developer access to the platform.
Automating security tests for Continuous IntegrationStephen de Vries
Two models for running automated security tests in a CI/CD pipeline: either blocking or parallel security tests
Integration depends on the level of cultural integration of security into DevOps.
3 Models of test ownership:
1. Owned by Security team - least desirable
2. Owned by DevOps, overseen by security - better
3. Owned by SecDevOps, look Ma, no silos.
Overview of BDD-Security
Configuring Jenkins with BDD-Security as inline tests
Devops security-An Insight into Secure-SDLCSuman Sourav
The integration of Security into DevOps is already happening out of necessity. DevOps is a powerful paradigm shift and companies often don’t understand how security fits. Aim of this session is to give an overview of DevOps security and How security can be integrated and automated into each phases of software development life-cycle.
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavAbhay Bhargav
s its biggest bottleneck and security is becoming the most pervasive bottleneck in most DevOps practices. Teams are unable to come up with security practices that integrate into the DevOps lifecycle and ensure continuous and smooth delivery of applications to customers. In fact, security failures in DevOps amplify security flaws in production as they are delivered at scale. If DevOps should not be at odds with security, then we must find ways to achieve the following on priority:
- Integrate effective threat modeling into Agile development practices
- Introduce Security Automation into Continuous Integration
- Integrate Security Automation into Continuous Deployment
While there are other elements like SAST and Monitoring that are important to SecDevOps, my talk will essentially focus on these three elements with a higher level of focus on Security Automation. In my talk, I will explore the following, with reference to the topic:
- The talk will be replete with anecdotes from personal consulting and penetration testing experiences.
- I will briefly discuss Threat Modeling and its impact on DevOps. I will use examples to demonstrate practical ways that one can use threat modeling effectively to break down obstacles and create security automation that reduces the security bottleneck in the later stages of the DevOps cycle.
- I firmly believe that Automated Web Vulnerability Assessment (using scanners) no matter how tuned, can only produce 30-40% of the actual results as opposed to a manual application penetration test. I find that scanning tools fail to identify most vulnerabilities with modern Web Services (REST. I will discuss examples and demonstrate how one can leverage automated vulnerability scanners (like ZAP, through its Python API) and simulate manual testing using a custom security automation suite. In Application Penetration Testing, its impossible to have a one size-fits all, but there’s no reason why we can’t deliver custom security automation to simulate most of the manual penetration testing to combine them into a custom security automation suite that integrates with CI tools like Jenkins and Travis. I intend to demonstrate the use a custom security test suite (written in Python that integrates with Jenkins), against an intentionally vulnerable e-commerce app.
- My talk will also detail automation to identify vulnerabilities in software libraries and components, integrated with CI tools.
- Finally, I will (with the use of examples and demos) explain how one can use “Infrastructure as Code” practice to perform pre and post deployment security checks, using tools like Chef, Puppet and Ansible.
The document provides an overview and primer on SecDevOps. It discusses how traditional development, operations, and security roles often work in silos, which SecDevOps seeks to improve by integrating security automation into the development process. Key aspects of SecDevOps covered include defining it as security automation and discussing security at scale. The document also discusses why security automation is important to reduce human error, provides typical enterprise staffing ratios of developers, operations, and security professionals, and how appointing security champions from development teams can help integrate security practices.
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon
This document summarizes Tim Mackey's presentation at DevSecCon. It discusses the importance of security driven development practices like using trusted components, continuous integration processes that include security testing, and digitally signing container images. It warns that while infrastructure teams aim to provide security, vulnerabilities can still exist, and advocates continually evaluating the trust of components used. The document predicts disclosure of security issues will increase and outlines penalties for data breaches under new regulations like GDPR. It emphasizes automating awareness of open source dependencies to keep pace with DevOps.
Modern applications can protect themselves from attackers by incorporating runtime monitoring capabilities. The OWASP AppSensor project aims to make intrusion detection primitives available within applications so they can detect attacks and automatically respond before an attacker succeeds. It works by collecting event data from applications and analyzing them for attacks using configurable rules. This allows applications to become self-defending by detecting and stopping attackers without needing manual responses.
SecDevOps is a set of business methodologies, operational procedures, & cultural practices proven to increase security, improve software quality, improve release frequency, & provide immediate insight into organizational exposures.
This presentation was accepted to the ASIA 2018 conference, authored by Thomas Cappetta.
In this session I will present best practices of how open source tools (used in the DevOps and security communities) can be properly chained together to form a framework that can - as part of an agile software development CI chain - perform automated checking of certain security aspects. This does not remove the requirement for manual pentests, but tries to automate early security feedback to developers.
Based on my experience of applying SecDevOps techniques to projects, I will present the glue steps required on every commit and at nightly builds to achieve different levels of depth in automated security testing during the CI workflow.
I will conclude with a "SecDevOps Maturity Model" of different stages of automated security testing and present concrete examples of how to achieve each stage with open source security tools.
This document discusses myths and misperceptions around open source security. It addresses 6 common misperceptions: 1) that security tools can find all open source vulnerabilities, 2) that scanning is best done at the end of development, 3) that the National Vulnerability Database covers all vulnerabilities, 4) that replacing vulnerable components is always the answer, 5) that the "many eyes" theory ensures open source security, and 6) that open source is less secure than commercial software. The document provides details to counter each misperception and emphasizes that all software can have vulnerabilities, and that visibility into what software is used is key to security.
Integrating security into Continuous DeliveryTom Stiehm
This document discusses integrating security practices into continuous delivery processes. It describes Coveros' SecureAgile development process which includes threat modeling, risk analysis, penetration testing, security stories, secure code reviews, defensive coding and design, and secure testing. The goal is to assure timely delivery of software while achieving security objectives. Integrating security helps make applications more secure, reduces security costs, improves quality, and protects applications from attackers.
Overcoming Security Challenges in DevOpsAlert Logic
This document discusses taking a DevOps approach to security. It outlines how DevOps practices like automation, immutable infrastructure, and infrastructure as code can improve an organization's security posture by reducing vulnerabilities and ensuring consistent configurations. It also addresses some of the challenges of integrating security into DevOps environments and proposes moving towards software-defined security models that provide real-time visibility, automatic protection, and continuous assessment.
Quality of software code for a given product shipped effectively translates not only to its functional quality but as well to its non functional aspects say security. Many of the issues in code can be addressed much before they reach SCM.
Continuous and Visible Security Testing with BDD-SecurityStephen de Vries
This presentation makes the case for adapting security requirements and processes to those used by developers. Specifically, it advocates the use of BDD (Given/When/Then) specifications to create self-verifying security requirements.
You've heard of infrastructure as code, with the BDD-Security framework, we can now write security-processes-as-code.
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
Presented September 15, 2016 by John Steven, CTO, Cigital; Mike Pittenger, VP Security Strategy, Black Duck
Today, open source comprises a critical component of software code in the average application, yet most organizations lack the visibility into and control of the open source they’re using. A 2016 analysis of 200 commercial applications showed that 67% contained known open source vulnerabilities. Whether it’s a SaaS solution you deliver to millions of customers, or an internal application developed for employees, addressing the open source visibility and control challenges is vital to ensuring proper software security.
Open source use is ubiquitous worldwide. It powers your mobile phone and your company’s most important cloud application. Securing mission critical applications must evolve to address open source as part of software security, complementing and extending the testing of in-house written code.
In this webinar by Cigital and Black Duck security experts, you’ll learn:
- The current state of application security management within the Software Development Lifecycle (SDLC)
- New security considerations organizations face in testing applications that combine open source and in-house written software.
- Steps you can take to automate and manage open source security as part of application development
This document discusses DevSecOps, including what it is, why it is needed, and how to implement it. DevSecOps aims to integrate security tools and a security-focused culture into the development lifecycle. It allows security to keep pace with rapid development. The document outlines how to incorporate security checks at various stages of the development pipeline from pre-commit hooks to monitoring in production. It provides examples of tools that can be used and discusses cultural and process aspects of DevSecOps implementation.
Connect Ops and Security with Flexible Web App and API ProtectionDevOps.com
Organizations continue to adopt container orchestration to drive efficiencies in their CI/CD pipelines. Given the current business climate with more employees working from home and consumers transacting more online, how can development and operations teams release at increasing velocity with protection baked in?
Connecting operations and security teams have not always been a smooth process: developers and operations staff are charged with site reliability, availability, and uptime while security staff is held responsible for securing an organization’s always-moving perimeter and valuable web layer assets. But the lines have started to blur between DevOps teams and security: you can’t guarantee uptime without baking effective application security tooling into your processes and infrastructure configurations.
A true next-generation, holistic web application and API protection platform does just that: operations teams can integrate security into their workflows and ensure new infrastructure and app code released to production is both effective and secure. Join application security experts Aneel Dadani and Orlando Barerra II from Signal Sciences to learn how your team can deploy at scale safely while gaining layer 7 visibility in production environments. Attendees will learn:
How to inspect web traffic in containers, at the API gateway, or the ingress
How DevOps teams can scale their application footprint to meet demand while securing your codebase in production
How development teams can gain visibility into how their apps and APIs are being used in production and what vulnerabilities may exist that they overlooked
Demo these application security concepts with Ansible, a simple yet powerful IT automation engine that companies use to accelerate DevOps initiatives, including baking application security into their infrastructure.
we45’s SecDevOps and Security Automation Framework (2SAF) aims at decreasing mean time to product deployment with reduced operational resources – with the inclusion of relevant custom product security controls. The 2SAF enables engineering teams to implement a customized automated and threat modeled penetration testing model for every release of the produce lifecycle.
Our powerful Review – Train – Study model has enabled engineering and DevOps teams to implement 2SAF within weeks to a fully operational and measurable working framework.
Continuous Security Testing with Devops - OWASP EU 2014Stephen de Vries
This document discusses continuous security testing in a DevOps environment. It advocates treating security testing as a form of quality testing that is automated and integrated into continuous delivery pipelines. The author presents the BDD-Security testing framework, which uses behavior-driven development and test automation tools like Selenium to write security tests against applications. The framework wraps security scanning tools like OWASP ZAP and integrates security testing into continuous integration pipelines like Jenkins. This allows security to keep up with DevOps practices like deploying code changes multiple times per day.
The document discusses Netflix's approach to proactive security. It defines proactive security as anticipating and addressing security issues before they become problems through automation, intelligence, and continuous monitoring and improvement. Some key aspects of Netflix's proactive security program include using tools like Monterey to automatically discover and scan assets, the Simian Army to test resiliency, Dirty Laundry to find exposed assets, Security Monkey to monitor AWS changes, and sharing security knowledge and tools through open source projects. The document advocates for simplifying security to encourage developer adoption and continuously reevaluating approaches as environments change.
Présentation sur les web services et implémentation d'un service web en Ruby et Sinatra. Le code source se trouve sur Github https://github.com/fenicks/joke_server.
This document discusses integrating security into DevOps practices. It notes that while DevOps embraces cloud automation and agility, security can slow things down. Traditional security approaches are ill-suited for cloud environments. The document introduces CloudPassage Halo as a security-as-a-service platform that provides automated security controls like firewall management, intrusion detection and vulnerability scanning across cloud infrastructure in a self-service manner. It also describes the CloudPassage Halo architecture and demostrates some of its features. Finally, it promotes the CloudPassage Halo API toolbox and offers six months of free developer access to the platform.
Automating security tests for Continuous IntegrationStephen de Vries
Two models for running automated security tests in a CI/CD pipeline: either blocking or parallel security tests
Integration depends on the level of cultural integration of security into DevOps.
3 Models of test ownership:
1. Owned by Security team - least desirable
2. Owned by DevOps, overseen by security - better
3. Owned by SecDevOps, look Ma, no silos.
Overview of BDD-Security
Configuring Jenkins with BDD-Security as inline tests
Devops security-An Insight into Secure-SDLCSuman Sourav
The integration of Security into DevOps is already happening out of necessity. DevOps is a powerful paradigm shift and companies often don’t understand how security fits. Aim of this session is to give an overview of DevOps security and How security can be integrated and automated into each phases of software development life-cycle.
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavAbhay Bhargav
s its biggest bottleneck and security is becoming the most pervasive bottleneck in most DevOps practices. Teams are unable to come up with security practices that integrate into the DevOps lifecycle and ensure continuous and smooth delivery of applications to customers. In fact, security failures in DevOps amplify security flaws in production as they are delivered at scale. If DevOps should not be at odds with security, then we must find ways to achieve the following on priority:
- Integrate effective threat modeling into Agile development practices
- Introduce Security Automation into Continuous Integration
- Integrate Security Automation into Continuous Deployment
While there are other elements like SAST and Monitoring that are important to SecDevOps, my talk will essentially focus on these three elements with a higher level of focus on Security Automation. In my talk, I will explore the following, with reference to the topic:
- The talk will be replete with anecdotes from personal consulting and penetration testing experiences.
- I will briefly discuss Threat Modeling and its impact on DevOps. I will use examples to demonstrate practical ways that one can use threat modeling effectively to break down obstacles and create security automation that reduces the security bottleneck in the later stages of the DevOps cycle.
- I firmly believe that Automated Web Vulnerability Assessment (using scanners) no matter how tuned, can only produce 30-40% of the actual results as opposed to a manual application penetration test. I find that scanning tools fail to identify most vulnerabilities with modern Web Services (REST. I will discuss examples and demonstrate how one can leverage automated vulnerability scanners (like ZAP, through its Python API) and simulate manual testing using a custom security automation suite. In Application Penetration Testing, its impossible to have a one size-fits all, but there’s no reason why we can’t deliver custom security automation to simulate most of the manual penetration testing to combine them into a custom security automation suite that integrates with CI tools like Jenkins and Travis. I intend to demonstrate the use a custom security test suite (written in Python that integrates with Jenkins), against an intentionally vulnerable e-commerce app.
- My talk will also detail automation to identify vulnerabilities in software libraries and components, integrated with CI tools.
- Finally, I will (with the use of examples and demos) explain how one can use “Infrastructure as Code” practice to perform pre and post deployment security checks, using tools like Chef, Puppet and Ansible.
The document provides an overview and primer on SecDevOps. It discusses how traditional development, operations, and security roles often work in silos, which SecDevOps seeks to improve by integrating security automation into the development process. Key aspects of SecDevOps covered include defining it as security automation and discussing security at scale. The document also discusses why security automation is important to reduce human error, provides typical enterprise staffing ratios of developers, operations, and security professionals, and how appointing security champions from development teams can help integrate security practices.
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon
This document summarizes Tim Mackey's presentation at DevSecCon. It discusses the importance of security driven development practices like using trusted components, continuous integration processes that include security testing, and digitally signing container images. It warns that while infrastructure teams aim to provide security, vulnerabilities can still exist, and advocates continually evaluating the trust of components used. The document predicts disclosure of security issues will increase and outlines penalties for data breaches under new regulations like GDPR. It emphasizes automating awareness of open source dependencies to keep pace with DevOps.
Modern applications can protect themselves from attackers by incorporating runtime monitoring capabilities. The OWASP AppSensor project aims to make intrusion detection primitives available within applications so they can detect attacks and automatically respond before an attacker succeeds. It works by collecting event data from applications and analyzing them for attacks using configurable rules. This allows applications to become self-defending by detecting and stopping attackers without needing manual responses.
SecDevOps is a set of business methodologies, operational procedures, & cultural practices proven to increase security, improve software quality, improve release frequency, & provide immediate insight into organizational exposures.
This presentation was accepted to the ASIA 2018 conference, authored by Thomas Cappetta.
In this session I will present best practices of how open source tools (used in the DevOps and security communities) can be properly chained together to form a framework that can - as part of an agile software development CI chain - perform automated checking of certain security aspects. This does not remove the requirement for manual pentests, but tries to automate early security feedback to developers.
Based on my experience of applying SecDevOps techniques to projects, I will present the glue steps required on every commit and at nightly builds to achieve different levels of depth in automated security testing during the CI workflow.
I will conclude with a "SecDevOps Maturity Model" of different stages of automated security testing and present concrete examples of how to achieve each stage with open source security tools.
This document discusses myths and misperceptions around open source security. It addresses 6 common misperceptions: 1) that security tools can find all open source vulnerabilities, 2) that scanning is best done at the end of development, 3) that the National Vulnerability Database covers all vulnerabilities, 4) that replacing vulnerable components is always the answer, 5) that the "many eyes" theory ensures open source security, and 6) that open source is less secure than commercial software. The document provides details to counter each misperception and emphasizes that all software can have vulnerabilities, and that visibility into what software is used is key to security.
Integrating security into Continuous DeliveryTom Stiehm
This document discusses integrating security practices into continuous delivery processes. It describes Coveros' SecureAgile development process which includes threat modeling, risk analysis, penetration testing, security stories, secure code reviews, defensive coding and design, and secure testing. The goal is to assure timely delivery of software while achieving security objectives. Integrating security helps make applications more secure, reduces security costs, improves quality, and protects applications from attackers.
Overcoming Security Challenges in DevOpsAlert Logic
This document discusses taking a DevOps approach to security. It outlines how DevOps practices like automation, immutable infrastructure, and infrastructure as code can improve an organization's security posture by reducing vulnerabilities and ensuring consistent configurations. It also addresses some of the challenges of integrating security into DevOps environments and proposes moving towards software-defined security models that provide real-time visibility, automatic protection, and continuous assessment.
Quality of software code for a given product shipped effectively translates not only to its functional quality but as well to its non functional aspects say security. Many of the issues in code can be addressed much before they reach SCM.
Continuous and Visible Security Testing with BDD-SecurityStephen de Vries
This presentation makes the case for adapting security requirements and processes to those used by developers. Specifically, it advocates the use of BDD (Given/When/Then) specifications to create self-verifying security requirements.
You've heard of infrastructure as code, with the BDD-Security framework, we can now write security-processes-as-code.
Managing Open Source in Application Security and Software Development LifecycleBlack Duck by Synopsys
Presented September 15, 2016 by John Steven, CTO, Cigital; Mike Pittenger, VP Security Strategy, Black Duck
Today, open source comprises a critical component of software code in the average application, yet most organizations lack the visibility into and control of the open source they’re using. A 2016 analysis of 200 commercial applications showed that 67% contained known open source vulnerabilities. Whether it’s a SaaS solution you deliver to millions of customers, or an internal application developed for employees, addressing the open source visibility and control challenges is vital to ensuring proper software security.
Open source use is ubiquitous worldwide. It powers your mobile phone and your company’s most important cloud application. Securing mission critical applications must evolve to address open source as part of software security, complementing and extending the testing of in-house written code.
In this webinar by Cigital and Black Duck security experts, you’ll learn:
- The current state of application security management within the Software Development Lifecycle (SDLC)
- New security considerations organizations face in testing applications that combine open source and in-house written software.
- Steps you can take to automate and manage open source security as part of application development
This document discusses DevSecOps, including what it is, why it is needed, and how to implement it. DevSecOps aims to integrate security tools and a security-focused culture into the development lifecycle. It allows security to keep pace with rapid development. The document outlines how to incorporate security checks at various stages of the development pipeline from pre-commit hooks to monitoring in production. It provides examples of tools that can be used and discusses cultural and process aspects of DevSecOps implementation.
Connect Ops and Security with Flexible Web App and API ProtectionDevOps.com
Organizations continue to adopt container orchestration to drive efficiencies in their CI/CD pipelines. Given the current business climate with more employees working from home and consumers transacting more online, how can development and operations teams release at increasing velocity with protection baked in?
Connecting operations and security teams have not always been a smooth process: developers and operations staff are charged with site reliability, availability, and uptime while security staff is held responsible for securing an organization’s always-moving perimeter and valuable web layer assets. But the lines have started to blur between DevOps teams and security: you can’t guarantee uptime without baking effective application security tooling into your processes and infrastructure configurations.
A true next-generation, holistic web application and API protection platform does just that: operations teams can integrate security into their workflows and ensure new infrastructure and app code released to production is both effective and secure. Join application security experts Aneel Dadani and Orlando Barerra II from Signal Sciences to learn how your team can deploy at scale safely while gaining layer 7 visibility in production environments. Attendees will learn:
How to inspect web traffic in containers, at the API gateway, or the ingress
How DevOps teams can scale their application footprint to meet demand while securing your codebase in production
How development teams can gain visibility into how their apps and APIs are being used in production and what vulnerabilities may exist that they overlooked
Demo these application security concepts with Ansible, a simple yet powerful IT automation engine that companies use to accelerate DevOps initiatives, including baking application security into their infrastructure.
we45’s SecDevOps and Security Automation Framework (2SAF) aims at decreasing mean time to product deployment with reduced operational resources – with the inclusion of relevant custom product security controls. The 2SAF enables engineering teams to implement a customized automated and threat modeled penetration testing model for every release of the produce lifecycle.
Our powerful Review – Train – Study model has enabled engineering and DevOps teams to implement 2SAF within weeks to a fully operational and measurable working framework.
Continuous Security Testing with Devops - OWASP EU 2014Stephen de Vries
This document discusses continuous security testing in a DevOps environment. It advocates treating security testing as a form of quality testing that is automated and integrated into continuous delivery pipelines. The author presents the BDD-Security testing framework, which uses behavior-driven development and test automation tools like Selenium to write security tests against applications. The framework wraps security scanning tools like OWASP ZAP and integrates security testing into continuous integration pipelines like Jenkins. This allows security to keep up with DevOps practices like deploying code changes multiple times per day.
The document discusses Netflix's approach to proactive security. It defines proactive security as anticipating and addressing security issues before they become problems through automation, intelligence, and continuous monitoring and improvement. Some key aspects of Netflix's proactive security program include using tools like Monterey to automatically discover and scan assets, the Simian Army to test resiliency, Dirty Laundry to find exposed assets, Security Monkey to monitor AWS changes, and sharing security knowledge and tools through open source projects. The document advocates for simplifying security to encourage developer adoption and continuously reevaluating approaches as environments change.
Présentation sur les web services et implémentation d'un service web en Ruby et Sinatra. Le code source se trouve sur Github https://github.com/fenicks/joke_server.
Creating and operating the Riyadh Bus Networkcafs-org
Creating and operating the Riyadh Bus Network is a major project for the capital of Saudi Arabia that will:
1) Create and operate a 100-line bus network with over 1,000 buses to offer modern public transportation integrated with the under construction metro network.
2) Roll out the network in three stages from 2017 onwards followed by a ten-year operation contract.
3) Anticipate over 120 million passenger trips annually starting in 2024.
The document outlines requirements and plans for an app called Nudg that allows users to create and manage task lists. The MVP requirements are to allow users to enter tasks, display them in a list, and view full task details. Additional planned features include prioritizing tasks, using a calendar to set due dates, categorizing tasks, and adding hashtags. The aim is to make adding tasks very quick and simple. The developer planned with diagrams and paper and tracked tasks using Nudg itself. The final app structure includes classes for managing tags, nudgs, shared preferences, and more. Potential future enhancements are also listed.
ESTA ES UNA PRESENTACION EL LA CUAL DESCRIBE LA TEORIA DEL CONOCIMIENTO EN LA ASIGNATURA DE MATERIAL DIDACTICO Y TECNOLOGIA DE LA UNIVERSIDAD ESTATAL DE MILAGRO
La tecnología ha impactado positivamente el proceso de aprendizaje e incrementado numerosos proyectos educativos, favoreciendo la enseñanza. También ha beneficiado a personas que no podían combinar estudios y trabajo. A pesar de tener consecuencias positivas y negativas, se reconoce la importancia de la informática en la sociedad, como lo confirman diversos estudios internacionales.
Eleks is a software development company established in 1991 in Lviv, Ukraine that has since expanded to locations in New York, London, and Rzeszow, Poland. It employs over 900 professionals and has delivered solutions to over 400 Fortune 500 customers. Eleks focuses on product engineering, technology consulting, and digital services. It prides itself on a highly skilled workforce, with 71% of employees holding PhDs and an emphasis on continuing education and professional development opportunities. Eleks also offers competitive benefits for employees such as an on-site gym, healthcare program, and childcare support.
This document provides financial summaries for various departments and organizations within the Evangelical Covenant Church from 2005-2009. It summarizes the revenues and expenses for Covenant World Relief, Paul Carlson Partnership, and Haiti earthquake relief. It also provides budget results and overviews of Bethany Benefit Service, the Covenant Pension Plan, National Covenant Properties, Covenant Trust Company, and the audit report.
This document discusses how CAE can help organizations conquer their IT demands through a collaborative approach called "technology together." It describes CAE's unique three-phased approach of establishing a base camp, guiding clients on a journey, and providing a view from the summit to deliver flexible, scalable, and secure IT infrastructure tailored to each client's specific needs and objectives. CAE commits to always providing exceptional customer service through understanding each client's complex business needs and aligning solutions accordingly.
James Mead Jr. has over 20 years of experience starting and operating businesses across various asset classes. He has consulted for hedge funds, registered investment advisers, and proprietary trading firms. As a former member of several major exchanges, he advises clients on options strategies, risk management, and generating returns. Mead has started new institutional businesses, developed risk management platforms, and managed traders. He has achieved high returns in his career, including over 55% for one firm and 140% for seven years at another.
Mailer - Program for the San Diego Dental Convention, JUNE 24-25, 2016Chris Ippolito
The document provides information about the San Diego Dental Convention taking place June 24-25, 2016 at the Marina Village and Conference Center in San Diego, California. The convention will include various continuing education courses on topics such as orthodontics, periodontics, endodontics, forensic dentistry, practice management and more. Presenters will include dentists, attorneys and other professionals. Participants can earn continuing education credits by attending courses. The convention will also include breakfast, lunch, a wine and cheese social and prizes.
Gina's Sports Marketing Portfolio throughout OSU ExperienceGina Nix
Gina Nix is an Oregon State University student majoring in marketing. She has worked in various roles supporting Oregon State athletics including as a social media representative, sponsorship coordinator, and game day operations roles where she engaged with fans, clients, and provided VIP tours. She also has experience in brand management, sales support, and working on the Pac-12 Network.
El documento discute los vacíos éticos y legales en la sociedad virtual. Señala que la ética individual y social no se aplican completamente al entorno virtual debido al anonimato y falta de contacto físico. Esto ha llevado a consecuencias como la venta no autorizada de datos personales y el acoso cibernético. También analiza las diferencias entre las sociedades real y virtual, y cómo los jóvenes son los que más información personal comparten y están más expuestos a delitos en línea.
Jason Chan leads the cloud security team at Netflix and previously worked in security at large tech companies and startups. The document discusses trends in security hiring, including an increasing demand for security professionals at companies to build their own teams, security vendors, startups, and consulting firms. It describes the types of work in security including defensive and offensive roles, and provides an overview of the security organization and roles at Netflix.
Este documento describe las características anatómicas internas y externas de los saurios, en particular la iguana verde. Describe las partes de la cabeza, boca, dientes, piel, esqueleto, cráneo y otros órganos como los poros femorales, hemipenes y ojo parietal. Explica cómo estas características ayudan a la iguana a alimentarse, defenderse, reproducirse y regular su temperatura.
The goal of our latest customer webinar was to help customers understand and fully utilize AppFolio Owner & Tenant Portals.
AppFolio's Owners Portal has been updated to accept owner contributions via credit card and the tenant portal is now fully mobile friendly.
Polyglot payloads in practice by avlidienbrunn at HackPraMathias Karlsson
A lecture/talk describing how to build and use polyglot payloads for finding vulnerabilities in web applications that traditional payloads can't.
Here's the last slide: http://www.slideshare.net/MathiasKarlsson2/final-slide-36636479
Bug bounty programs involve paying security researchers rewards for finding vulnerabilities in companies' products. To participate, researchers need to understand the target company's products and domains, know which companies offer bounties, and find bugs that are in scope like XSS, SQL injection, or authentication bypasses. Rewards can range from $100 to $20,000. Major companies like Google, Facebook, and Mozilla run bounty programs and have collectively paid over $1 million to researchers. Examples are shown of real bugs found and reported through bounty programs. The conclusion encourages reporting bugs to companies rather than selling vulnerabilities.
This document outlines a presentation given by Simón Roses Femerling on software security verification tools. It discusses BinSecSweeper, an open source tool created by VulnEx to scan binaries and check that security best practices were followed in development. The presentation covers using BinSecSweeper to verify in-house software, assess a company's software security posture, and compare the security of popular browsers. Examples of plugin checks and reports generated by BinSecSweeper are also provided.
The document discusses Purple Teaming and infrastructure as code (IaC) tools for security simulation labs. It introduces BlueCloud and PurpleCloud simulation labs, with BlueCloud being a single Windows host lab for adversary simulation and PurpleCloud being an open-source tool that automates the creation of labs in Azure, including labs with Azure Active Directory and a detection engineering focus. Purple Teaming is described as Red and Blue teams collaborating to improve defenses through adversary emulations. IaC tools like Terraform and Pulumi are discussed for provisioning lab infrastructure.
Aleksei Dremin - Application Security Pipeline - phdays9Alexey Dremin
This document discusses setting up an application security pipeline for continuous integration and delivery (CI/CD). It recommends using static application security testing (SAST) tools, dependency checkers, source code scanners, dynamic application security testing (DAST) tools, and integrating them with Jenkins. It also suggests managing vulnerabilities and results in DefectDojo and notifying stakeholders of new findings through integration with communication tools like Slack. The document stresses the importance of educating developers on security best practices.
A Journey to Improve Infrastructure Compliance With InSpecCliffano Subagio
This document summarizes Cliffano Subagio's presentation on how his company improved infrastructure compliance through the use of InSpec. It describes how they initially had manual compliance checks that were time-consuming. They started using InSpec to automate correctness, readiness, security and compliance tests. This helped find issues early and continuously. They also created custom InSpec profiles and leveraged community profiles. As a result, their delivery pipeline and applications became more secure and compliant.
Getting your mobile test automation process in place - using Cucumber and Cal...Niels Frydenholm
Taking your mobile development process cycle, and the quality of the apps, from good to great.
See how focusing on automated tests can improve app quality, time to market and much more, and learn some best practices to avoid too much trouble getting started
Presented at Xamarin Evolve 2014
Laying the Foundation for Ionic Platform Insights on SparkIonic Security
The document discusses Ionic Security's use of Spark and Databricks to enable low-cost and flexible reporting from their transaction log data. Some key goals were reducing costs from their previous Elasticsearch solution, enabling quick development of domain-specific reports, and laying the foundation for advanced analytics. They built a Scala Spark job that ingests log data from S3 and runs configurable report queries to output results. This allows flexible querying while keeping costs low. Lessons learned included benefits of Scala for Spark development but its learning curve, advantages of a single uber jar workflow, and pushing complex logic into Spark user-defined functions.
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Ajin Abraham
Tizen is an open source operating system that can run on various devices including smart TVs and IoT devices. It uses a security model that isolates applications using SMACK mandatory access control and enforces content security policies for web applications. The presentation discusses hacking techniques tested against Tizen like exploiting shellshock vulnerabilities, bypassing address space layout randomization protections, and circumventing content security policies. It also provides an overview of methodologies for analyzing Tizen application security like static analysis of manifest and configuration files, decompiling native applications, and network analysis using a proxy. Overall the presentation evaluates the security of Tizen and highlights some implementation issues found.
This document outlines an agenda for a hands-on session on integrating Sonar with Jenkins on Amazon EC2. It includes steps for launching an EC2 instance, downloading keys, and accessing the instance via SSH. It then provides overviews of Jenkins for continuous integration and Sonar for code quality analysis. The document describes plugins for each and how Sonar can analyze code for violations, bugs, test coverage and more. It concludes with references for further information.
20140708 - Jeremy Edberg: How Netflix Delivers SoftwareDevOps Chicago
Netflix delivers software through fully automated processes and a service-oriented architecture. They hire responsible developers and give them freedom and responsibility. Netflix builds everything to withstand failures through redundancy, automation, and a philosophy of "automate all the things."
Integrating Splunk into your Spring ApplicationsDamien Dallimore
How much visibility do you really have into your Spring applications? How effectively are you capturing,harnessing and correlating the logs, metrics, & messages from your Spring applications that can be used to deliver this visibility ? What tools and techniques are you providing your Spring developers with to better create and utilize this mass of machine data ? In this session I'll answer these questions and show how Splunk can be used to not only provide historical and realtime visibility into your Spring applications , but also as a platform that developers can use to become more "devops effective" & easily create custom big data integrations and standalone solutions.I'll discuss and demonstrate many of Splunk's Java apps,frameworks and SDK and also cover the Spring Integration Adaptors for Splunk.
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
Whether you’re working exclusively on Azure or with multiple cloud environments, there are certain things you should consider when moving assets to the public cloud. As with any cloud deployment, security is a top priority, and moving your workloads to the Azure cloud doesn’t mean you’re not responsible for the security of your operating system, applications, and data.
Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your environment is secure. In this session, we will discuss step-by-step what you need to do to secure access at the administrative, application and network layers.
The workshop covered cloud-native Java technologies using Open Liberty and MicroProfile. It included presentations on 12-factor and 15-factor application methodologies and hands-on labs exploring OpenAPI, health checks, metrics, and JWT authentication. Leaders demonstrated how to build and deploy modular, scalable microservices using open-source tools that optimize developer productivity and application portability in cloud environments.
Bringing Security Testing to Development: How to Enable Developers to Act as ...Achim D. Brucker
Security testing is an important part of any security development life-cycle (SDLC) and, thus, should be a part of any software development life-cycle.
We will present SAP's Security Testing Strategy that enables developers to find security vulnerabilities early by applying a variety of different security testing methods and tools. We explain the motivation behind it, how we enable global development teams to implement the strategy, across different SDLCs and report on our experiences.
Back to the Future: Containerize Legacy Applications - Rob Tanner, Northern T...Docker, Inc.
People typically think of Docker for microservices and try to make the smallest container they can. There are tremendous benefits to a microservices model but those are not the only apps that qualify for containers. Traditional, homegrown, monolithic apps are also great candidates for Docker - why? By containerizing these apps, many of the same agility, portability, security and cost savings benefits can be applied to the hundreds (if not thousands) of apps in your datacenters. But where to begin? Attend this session to learn how to approach modernizing traditional apps (MTA), considerations, the available tools and possibilities.
Netflix runs nearly all of its services on AWS and has adapted its security practices to fit its cloud-native architecture and DevOps model. Key aspects of Netflix's approach include integrating security tools into the development workflow, making secure options easy to use through self-service tools, and employing automated verification tools to monitor configurations while still trusting developers. This balance of empowering developers while verifying their work helps security scale alongside Netflix's dynamic cloud environment.
- Overview of a use case - Sentiment analysis
- Introduction - Using Jupyter Notebook & AWS SageMaker
- Setup New Project
- Setup and Run the Build CI/CD Pipeline
- Setup the Release Pipeline
- Test Build and Release Pipelines
- Testing the deployed solution
- Examining deployed model performance
TAGS in short is a generic framework which has been specifically designed to cater to needs of any TFT client who seeks a low cost end-to-end automation solution using open source tools.
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingsteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Smart Mobile App Pitch Deck丨AI Travel App Presentation Templateyojeari421237
🚀 Smart Mobile App Pitch Deck – "Trip-A" | AI Travel App Presentation Template
This professional, visually engaging pitch deck is designed specifically for developers, startups, and tech students looking to present a smart travel mobile app concept with impact.
Whether you're building an AI-powered travel planner or showcasing a class project, Trip-A gives you the edge to impress investors, professors, or clients. Every slide is cleanly structured, fully editable, and tailored to highlight key aspects of a mobile travel app powered by artificial intelligence and real-time data.
💼 What’s Inside:
- Cover slide with sleek app UI preview
- AI/ML module implementation breakdown
- Key travel market trends analysis
- Competitor comparison slide
- Evaluation challenges & solutions
- Real-time data training model (AI/ML)
- “Live Demo” call-to-action slide
🎨 Why You'll Love It:
- Professional, modern layout with mobile app mockups
- Ideal for pitches, hackathons, university presentations, or MVP launches
- Easily customizable in PowerPoint or Google Slides
- High-resolution visuals and smooth gradients
📦 Format:
- PPTX / Google Slides compatible
- 16:9 widescreen
- Fully editable text, charts, and visuals
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC
Joyce Chen, Senior Advisor, Strategic Engagement at APNIC, presented on 'APNIC Policy Development Process' at the Local APIGA Taiwan 2025 event held in Taipei from 19 to 20 April 2025.
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC
Terry Sweetser, Training Delivery Manager (South Asia & Oceania) at APNIC presented an APNIC update at NZNOG 2025 held in Napier, New Zealand from 9 to 11 April 2025.
Understanding the Tor Network and Exploring the Deep Webnabilajabin35
While the Tor network, Dark Web, and Deep Web can seem mysterious and daunting, they are simply parts of the internet that prioritize privacy and anonymity. Using tools like Ahmia and onionland search, users can explore these hidden spaces responsibly and securely. It’s essential to understand the technology behind these networks, as well as the risks involved, to navigate them safely. Visit https://torgol.com/
Best web hosting Vancouver 2025 for you businesssteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Reliable Vancouver Web Hosting with Local Servers & 24/7 Supportsteve198109
Looking for powerful and affordable web hosting in Vancouver? 4GoodHosting offers premium Canadian web hosting solutions designed specifically for individuals, startups, and businesses across British Columbia. With local data centers in Vancouver and Toronto, we ensure blazing-fast website speeds, superior uptime, and enhanced data privacy—all critical for your business success in today’s competitive digital landscape.
Our Vancouver web hosting plans are packed with value—starting as low as $2.95/month—and include secure cPanel management, free domain transfer, one-click WordPress installs, and robust email support with anti-spam protection. Whether you're hosting a personal blog, business website, or eCommerce store, our scalable cloud hosting packages are built to grow with you.
Enjoy enterprise-grade features like daily backups, DDoS protection, free SSL certificates, and unlimited bandwidth on select plans. Plus, our expert Canadian support team is available 24/7 to help you every step of the way.
At 4GoodHosting, we understand the needs of local Vancouver businesses. That’s why we focus on speed, security, and service—all hosted on Canadian soil. Start your online journey today with a reliable hosting partner trusted by thousands across Canada.
DNS Resolvers and Nameservers (in New Zealand)APNIC
Geoff Huston, Chief Scientist at APNIC, presented on 'DNS Resolvers and Nameservers in New Zealand' at NZNOG 2025 held in Napier, New Zealand from 9 to 11 April 2025.
5. Netflix Primer
• 100's of Developers
• Over 1,000 applications
• Hundreds of production pushes a day
• Over 50k instances
• Very Pro Open Source
• No Security Gates!
7. The Challenge
• Provide security in the environment described:
• No security gates
• Production Changes Rapidly
• Multiple Codes Bases (A/B Testing)
• Many Developers vs. 5 Member AppSec Team
13. Proactive Security
• Know your environment & weaknesses and work to improve
• Find problems early and address them
• Monitor for anomalies and be prepared to respond
• Collect meaningful data and use it to improve
• Simplify make security the easy path
• Reevaluate your approach
• Share what you learn with others
15. Goals
1. Understand your environment
2. Inject automated security controls
3. Tie environment and security together
16. Goal 1
Understand Your Environment
1. Know the components of your environment
2. Understand connections
3. Monitor for changes
17. Defining The Environment
• Applications that make up and support the
Netflix experience
1. Accessibility (How, Where, Who)
2. Functionality
3. Ownership
4. Risk Level
5. Security
18. Where do Applications Come
From?
• Binaries
• Appliances
• SaaS
• Internally Developed (Source Code)
19. Where do Applications Come
From?
SCMDevelopers Build Bake Deploy
1. Developers push code to SCM
2. Built into a package
3. Combined with BaseAMI to form a machine image
4. Deployed as an EC2 Instance
21. SCMDevelopers Build Bake Deploy
EC2 Instance
Cluster
Application
Cluster Cluster
EC2 InstanceEC2 Instance
ELB DNS Name
22. SCMDevelopers Build Bake Deploy
EC2 Instance
Cluster
Application
Dependencies BaseAMI
Source
Code
Package Baked AMI
DNS
Name
ELB
Penguin Shortbread
23. Penguin Shortbread
• Specialized Branch of Scumblr
• Tracks Applications and all their associated
metadata
• Repositories
• Committers
• DNS Names
• BaseAMI Information
• Dependencies
• More!
24. Penguin Shortbread
• Individual tasks for gathering different pieces of
metadata
• Tasks for Spinnaker, Github, Stash, Jenkins, etc.
• Easy to customize, maintain, etc.
• Searching and filtering based on any information
stored on the application.
• Examples:
What application uses sketchy.netflix.com?
What repos does Andy Hoernecke contribute to?
25. While we're at it...
• Collect information about how risky an
application is
• Calculate a risk score
• Determine which applications posed the great
risk and make decisions based on this
26. Security Monkey
• Monitor for changes in AWS environment
• Get alerts for important changes
• Integrations with Scumblr/Penguin Shortbread
27. Goal 1
Understand Your Environment
1. Know the components of your environment
2. Understand connections
3. Monitor for changes
29. SCMDevelopers Build Bake Deploy
Systems
Github
Stash
OpenGrok
Information
Source Code
Commit History
Committer
Owner Info
Security Tools/Services
Static Analysis
30. SCMDevelopers Build Bake Deploy
Systems
Jenkins
Information
Packaged Application
Dependency Info
Security Tools/Services
Static Analysis, Dependency Checking
31. SCMDevelopers Build Bake Deploy
Systems
Spinnaker
Bakery
Animator
Information
OS/Version
Animation Date
BaseAMI Info
Security Tools/Services
Host Analysis/Hardening
32. SCMDevelopers Build Bake Deploy
Systems
Spinnaker
DNS
Security Monkey
Information
Application Name
DNS Names
Security Groups
Security Tools/Services
Dynamic Scanning, Runtime Analysis, Penetration Testing
35. Scumblr 2.0
• Extended the model with Metadata
• Added:
• Generic Tasks
• Task Ordering/Grouping
• Customizable Views
• Events
36. New vs. Old
• Scumblr 1.0 Tasks:
Search Google
Search Twitter
Search Facebook
• Example Scumblr 2.0 Tasks:
1. Get list of Stash Repos
2. Run Brakeman on Rails Repos
3. Save the Results and Send out Notifications
37. Pulling it Together
• Dirty Laundry integrates with all our security tools
• Can track results based on a repo, a DNS name, an
API endpoint, etc.
• With Penguin Shortbread, can fit things together
38. Action
• Enhanced the ability to track status
• Added standard way to store/action vulnerability
data
• Workflowable provides easy mechanism to create
JIRA tickets, send out notifications, etc.
40. Goal 3
Tie Environment and Security Together
1. Understand vulnerabilities in context
2. Prioritize security services and remediation efforts
3. Enable linking security risks with their source
4. Identify weak links and look for improvements
Coming Soon