SlideShare a Scribd company logo
© 2017 WhiteHat Security, Inc.
Take Control:
Design a Complete DevSecOps
Program
Siamak Pazirandeh
Chief Architect
WhiteHat Security Inc.
© 2017 WhiteHat Security, Inc. 2
Siamak Pazirandeh
Chief Architect
Founding Engineer for over 14 years at
WhiteHat Security Inc. Specialized in
DAST (Dynamic Application Security
Testing), scalability, and deployment
automation.
© 2017 WhiteHat Security, Inc. 3
About WhiteHat Security
150+ TOP SECURITY RESEARCHERS
Santa Clara
Houston
Belfast
© 2017 WhiteHat Security, Inc. 4
© 2017 WhiteHat Security, Inc.
Gartner, 01 February 2017, “Market Insight: Security Market Transformation Disrupted by the Emergence
of Smart, Pervasive and Efficient Security”, Elizabeth Kim, Deborah Kish, Avivah Litan, Ruggero Contu,
Perry Carpenter, Sid Deshpande, Lawrence Pingree, Eric Ahlm, Jacqueline Heng, Dale Gardner
By 2020, 60% of digital businesses will suffer
major service failures due to IT security
teams' inability to manage digital risk.
It’s All About Risk
5
© 2017 WhiteHat Security, Inc.
Earlier Security = Saving $$
6
© 2017 WhiteHat Security, Inc.
Agenda
 What is DevSecOps?
 Basics of a Security Program
 Adding Security Checks into your DevOps Chains
 Example Scenarios
7
© 2017 WhiteHat Security, Inc.
Agenda
 What is DevSecOps?
 Basics of a Security Program
 Adding Security Checks into your DevOps chains
 Example scenarios
8
© 2017 WhiteHat Security, Inc.
Forces behind the DevSecOps movement
 Agile development dictates fast pace
 IT managed Infrastructure needs to keep up
 Must automate as much as possible in : development, deployment,
and operational environment
9
© 2017 WhiteHat Security, Inc.
DevSecOps
 IT teams responsible for Security
 Software iterates faster than IT can keep up
 DevSecOps : Weaves security into the fabric of your SDLC
 DevSecOps is to Security as DevOps is to IT
10
© 2017 WhiteHat Security, Inc.
Agenda
 What is DevSecOps
 Basics of a Secure Development
 Adding Security Checks into your DevOps chains
 Example scenarios
11
© 2017 WhiteHat Security, Inc.
The Challenge of Secure Software Development
• Security not the core competency for most
• Most organizations do not foster secure coding culture
• Most devs are not trained in Secure Coding practices
• Most devs are not supported well for Secure Coding
• Security often an after-thought
12
© 2017 WhiteHat Security, Inc.
Basics of Secure Development
 Understand your business risk exposure
 What is your company’s SDLC and DevOps maturity level?
 What is your architectural complexity?
 What is your current security stance?
 Answer, Document, Review periodically
13
© 2017 WhiteHat Security, Inc.
Basics of Secure Development
 Produce a supportive environment
 Customize security documentation to your tech-stack
 All tiers of an application (UI, APIs, Data-Access, Business Logic) need to be
developed with Security in mind
 Security practices need to be reinforced early and often
 Developer Training
 Come up with a Secure Development policy
14
© 2017 WhiteHat Security, Inc.
Security Practice Checklist
 1. Verify for Security Early and Often
 2. Parameterize Queries
 3. Encode Data
 4. Validate All Inputs
 5. Implement Identity and Authentication Controls
 6. Implement Appropriate Access Controls
 7. Protect Data
 8. Implement Logging and Intrusion Detection
 9. Use Security Frameworks and Libraries
 10. Error and Exception Handling
15
© 2017 WhiteHat Security, Inc.
Agenda
 What is DevSecOps
 Basics of a Security Program
 Adding Security Checks into your DevOps chains
 Example scenarios
16
© 2017 WhiteHat Security, Inc.
Reframing Security as a DevOps
Initiative
17
© 2017 WhiteHat Security, Inc.
DevSecOps – The Beginning
So, what if we …
 Treat security testing like feature testing
 Incorporate security requirement and checks into SDLC
 Use available tooling to tie vulnerability scanning into DevOps
build chains
 Automate defect state management
18
© 2017 WhiteHat Security, Inc.
Practice Security Throughout the SDLC
19
© 2017 WhiteHat Security, Inc. 20
A Typical Development Cycle
Code
Repo
Code /
Developer
Run
Tests
Build
Artifacts
Object
Registry
Team
Integration
QA Integration Pipeline
Nightly
Stage
© 2017 WhiteHat Security, Inc. 21
Incorporate Security Checks
Code
Repo
Run
Tests
2 Pull-Request:
Code Review
Static Analysis
Security Unit Tests
Build
Artifacts
Object
Registry
Team
Integration
Integration QA Pipeline
Jenkins
(Nightly)
Stage
1 Pre-Commit:
Static Analysis
Security Unit Tests
IDE integration
3 Integration:
Dynamic testing
Result Verification
File Vulnerability Tickets
5 Release:
Production safe
Dynamic testing
File Vulnerability Tickets
WAF / RASP
Rules
6 WAF/RASP
Pass, merge
4 QA Integration:
Dynamic testing
Result Verification
Production
© 2017 WhiteHat Security, Inc.
DevSecOps Trigger Points
1. Static scanning during development
2. Pull-Requests: Static scans of data-flow, semantic and configurational
3. Integration branch: Dynamic scanning
4. QA Release Candidate Integration: Dynamic scanning
5. Production Acceptance : Production-safe dynamic scanning
6. Post-Production: RASP (runtime application self-protection,) WAF (Web App Firewalls) both need
rules updated – automation is better
22
© 2017 WhiteHat Security, Inc.
Scenario 1 – Small Organization/App
Assume a Single Repo with a few components :
 UI static JS client-side APP
 REST API
 Data Interface - SQL Layer
23
© 2017 WhiteHat Security, Inc.
Scenario 1 – Small Application
Code
Repo
Code /
Developer
Run
Tests
PR hook
Build
Artifacts
Stage Prod
• Integration Tests
• Performance
• Security
1 Static analysis
IDE integration
Pre-commit
checklist
2 Static Analysis
Quick Feedback analysis
Verification a Challenge
3 Dynamic Analysis
Poll for results
Verification a Challenge
24
© 2017 WhiteHat Security, Inc.
Create a supportive dev environment
Code
Repo
Code /
Developer
Run
Tests
PR hook
Build
Artifacts
Stage Prod
• Integration Tests
• Performance
• Security
1 Static analysis
IDE integration
Pre-commit
checklist
2 Static Analysis
Quick Feedback analysis
Verification a Challenge
3 Dynamic Analysis
Poll for results
Verification a Challenge
25
© 2017 WhiteHat Security, Inc.
Security Integrated tools for developers
© 2017 WhiteHat Security, Inc.
“I fire up my IDE and triage my issues…”
• Search application vulnerabilities
© 2017 WhiteHat Security, Inc.
“I fire up my IDE and triage my issues…”
• Search application vulnerabilities
• Step through vulnerability in code
© 2017 WhiteHat Security, Inc.
“I fire up my IDE and triage my issues…”
• Search application vulnerabilities
• Step through vulnerability in code
• Review remediation guidance
© 2017 WhiteHat Security, Inc.
“I fire up my IDE and triage my issues…”
• Search application vulnerabilities
• Step through vulnerability in code
• Review remediation guidance
• Ask for help from TRC
© 2017 WhiteHat Security, Inc.
“I fire up my IDE and triage my issues…”
• Search application vulnerabilities
• Step through vulnerability in code
• Review remediation guidance
• Ask for help from TRC
• Apply Directed Remediation patch if available
© 2017 WhiteHat Security, Inc.
Scenario 1 – Small Application
Code
Repo
Code /
Developer
Run
Tests
PR hook
Build
Artifacts
Stage Prod
• Integration Tests
• Performance
• Security
1 Training,
Documentation
Dissemination
Code Reviews
2 Static Analysis
Quick Feedback
analysis
Verification a Challenge
3 Dynamic Analysis
Poll for results
Verification a Challenge
32
© 2017 WhiteHat Security, Inc.
Scenario 1 – Small Application
Code
Repo
Code /
Developer
Run
Tests
PR hook
Build
Artifacts
Stage Prod
• Integration Tests
• Performance
• Security
1 Training,
Documentation
Dissemination
Code Reviews
2 Static Analysis
Quick Feedback
analysis
Verification a Challenge
3 Dynamic Analysis
Poll for results
Verification a Challenge
33
© 2017 WhiteHat Security, Inc.
Example:
API Integration to Trigger a Dynamic Scan
PUT
https://sentinel.whitehatsec.com/api/site/6/scan_schedule
{
"schedule":{
"name":"Scan Once Now”,
"specs":[
{
"type":"scan-once-now”
}
]
}
}
200 OK
{
"creator": 524,
"job": {
"id": "10"
},
"specs": [
{
"id": "1503",
"type": "single",
"cron_spec": "53 14 15 6 * 2017"
}
],
"timezone": "America/Los_Angeles",
"href": "/api/job/10/schedule",
"id": "1503",
"api-version": 2,
"name": "Scan Once Now"
}
34
© 2017 WhiteHat Security, Inc.
Example:
API Integration to Query for Results
GET https://sentinel.whitehatsec.com/api/job/10/instance/1402?format=json
200 OK
{
"end": 1497564375,
"duration": 4,
"id": 1402,
"timestamp": 1497564358,
"requested_status": "",
"job": 10,
"status": "completed",
"begin": 1497564371,
"href": "/api/job/10/instance/1402“
}
35
© 2017 WhiteHat Security, Inc.
Example:
API Integration to Find Vulnerabilities
GET https://sentinel.whitehatsec.com/api/vuln?query_site=6&query_status=open&format=json
200 OK
{
"collection": [
{
"status": "open",
"site": "6",
"opened": "2017-06-15T19:07:54Z",
"threat": "2",
"url": "testsite.localdomain.lan/app.cgi?var=<script>alert(123)<%2Fscript>",
"id": "260",
"modified": "2017-06-15T22:06:12Z",
"first_opened": "2017-04-15T19:07:54Z",
"site_name": "Testsite",
"service_level_abbr": "BE",
"accepted": 0,
"found": "2017-04-15T19:07:54Z",
…
…
"severity": "3",
"score": 8,
"class": ”Cross Site Scripting",
"href": "/api/vuln/260",
"impact": 3
}
]
}
36
© 2017 WhiteHat Security, Inc. 37
Plugins Simplify Triggering Interactions
© 2017 WhiteHat Security, Inc. 38
Plugins = Automate Ticket Generation
© 2017 WhiteHat Security, Inc.
DevSecOps Pain Points
 Scanner Result Verification, False Positives
 Static / Dynamic Scan Speeds
 Results Need Interpretation and Prioritization within Business Context
39
© 2017 WhiteHat Security, Inc.
Scenario 2 – Medium-Size Organization/App
DevOps 1 -> team integration branch
(team integration commit hooks)
• Black Box dynamic testing in QA
• Business logic assessment
• Pen testing
Team needs to vet results, assess risk,
prioritize, apply sec policy to green/red
light)
DevOps 2 -> team integration branch
QA integration — Prod push
• Production safe dynamic testing
• Remediate using WAF technologies for
short term
• Queue up for fixing original ticket
Team needs to vet results, prioritize,
generate tickets, apply company security
policy to bubble up priorities
Each team does pre-commit hooks static analysis, verify results, accept/fix per security policy
40
© 2017 WhiteHat Security, Inc.
Scenario 2 – Common Challenges
Static analysis of individual repositories is too narrow-minded
(think micro-services)
Verification of results is time-consuming
Increasing need for analytics and overall risk analysis
41
© 2017 WhiteHat Security, Inc.
Scenario 3 - Large Company – Mature DevOps
42
➢ Compliance is more a factor
➢ Policy & records need documentation
➢ Risk management platforms can be integrated with vulnerability data
➢ Reports need to be available on-hand for audits
© 2017 WhiteHat Security, Inc.
Risk Management: Asset Enumeration
Evaluate Operational Risk, enumerate assets, produce security
policies for different groups
 Customize policies and requirements based risk profile of asset
 Platforms like RSA’s Archer evaluate your overall risk and integrate with
security vendors
 Integrations between your Risk model (BI, VM) software and scanning
services
43
© 2017 WhiteHat Security, Inc.
Asset Enumeration Example:
Fictitious Healthcare company
➢ Documentation content for customers (Low risk)
➢ Customer Health data portal (High risk, HIPAA)
➢ Online personalized medical appliances shopping website (High Risk, PCI, HIPAA)
➢ Backend Insurance/EHR Processing/B2B integrations (High risk, HIPAA)
➢ Backend statistics integrations for website usage statistics (Medium Risk, Non-
authenticated content only)
➢ New Mobile App portal (High risk, HIPAA)
44
© 2017 WhiteHat Security, Inc.
DevSecOps Integrations & Touchpoints:
Healthcare Example cont.
✓ Add ticketing system checkbox for architectural security review by feature.
✓ Add code review checkboxes on “pull-requests”. Integrate with ticketing.
✓ Codify security tests as part of unit/integration testing where possible.
✓ Tie static analysis security testing and make a gating factor for code check-ins. Integrate with
Tickets.
✓ Require Manager approval to by-pass security test failures.
✓ Test QA integration branches with verified security testing services – QA teams codify
negative security tests for verified vulnerabilities.
45
© 2017 WhiteHat Security, Inc.© 2017 WhiteHat Security, Inc.
Other Resources
How about mobile?
https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
OWASP Top 10 in practice, great page
: https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_W
HID
OWASP site also has links to many tools that can be integrated into
your SDLC automations
46
© 2017 WhiteHat Security, Inc.
Thank You
Siamak Pazirandeh
WhiteHat Security Inc.
max.pazirandeh@whitehatsec.com
47
Ad

More Related Content

What's hot (20)

DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
James Wickett
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
Michelangelo van Dam
 
DevSecOps: Bringing security to the DevOps pipeline
DevSecOps: Bringing security to the DevOps pipelineDevSecOps: Bringing security to the DevOps pipeline
DevSecOps: Bringing security to the DevOps pipeline
Aarno Aukia
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
James Wickett
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
Tej Luthra
 
Devops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter Chestna
DevSecCon
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
Stefan Streichsbier
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Erkang Zheng
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
Narudom Roongsiriwong, CISSP
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
Elizabeth Ayer
 
Dev secops. Real experience.
Dev secops. Real experience.Dev secops. Real experience.
Dev secops. Real experience.
Vitaly Balashov
 
How to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDDevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: How far left do you want to go with security? by Javie...DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
Ast in CI/CD by Ofer Maor
Ast in CI/CD by Ofer MaorAst in CI/CD by Ofer Maor
Ast in CI/CD by Ofer Maor
DevSecCon
 
DevSecOps for the DoD
DevSecOps for the DoDDevSecOps for the DoD
DevSecOps for the DoD
JamesHarmison
 
The Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOpsThe Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOps
WhiteSource
 
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery PipelineDevSecOps Singapore 2017 - Security in the Delivery Pipeline
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
James Wickett
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
James Wickett
 
DevSecOps: Bringing security to the DevOps pipeline
DevSecOps: Bringing security to the DevOps pipelineDevSecOps: Bringing security to the DevOps pipeline
DevSecOps: Bringing security to the DevOps pipeline
Aarno Aukia
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
James Wickett
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
Tej Luthra
 
Devops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter ChestnaDevops: Security's big opportunity by Peter Chestna
Devops: Security's big opportunity by Peter Chestna
DevSecCon
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Erkang Zheng
 
The End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon LietzThe End of Security as We Know It - Shannon Lietz
The End of Security as We Know It - Shannon Lietz
SeniorStoryteller
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
Elizabeth Ayer
 
Dev secops. Real experience.
Dev secops. Real experience.Dev secops. Real experience.
Dev secops. Real experience.
Vitaly Balashov
 
How to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspectiveHow to get the best out of DevSecOps - an operations perspective
How to get the best out of DevSecOps - an operations perspective
Colin Domoney
 
DevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CDDevSecOps: A New Hope for Security in CI/CD
DevSecOps: A New Hope for Security in CI/CD
Franklin Mosley
 
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: How far left do you want to go with security? by Javie...DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon
 
Ast in CI/CD by Ofer Maor
Ast in CI/CD by Ofer MaorAst in CI/CD by Ofer Maor
Ast in CI/CD by Ofer Maor
DevSecCon
 
DevSecOps for the DoD
DevSecOps for the DoDDevSecOps for the DoD
DevSecOps for the DoD
JamesHarmison
 
The Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOpsThe Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOps
WhiteSource
 

Similar to Take Control: Design a Complete DevSecOps Program (20)

Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
Arthur528009
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps Pipeline
Puma Security, LLC
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
SmartBear
 
Secure DevOps: A Puma's Tail
Secure DevOps: A Puma's TailSecure DevOps: A Puma's Tail
Secure DevOps: A Puma's Tail
Puma Security, LLC
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Denim Group
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
Check Point Software Technologies
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
Synopsys Software Integrity Group
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
Aarno Aukia
 
Simplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security ToolsSimplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
MarketingArrowECS_CZ
 
DevSecOps - Background, Status and Future Challenges
DevSecOps - Background, Status and Future ChallengesDevSecOps - Background, Status and Future Challenges
DevSecOps - Background, Status and Future Challenges
dsc71656
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
Arthur528009
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps Pipeline
Puma Security, LLC
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
SmartBear
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Continuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycleContinuous security: Bringing agility to the secure development lifecycle
Continuous security: Bringing agility to the secure development lifecycle
Rogue Wave Software
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Denim Group
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
Aarno Aukia
 
Simplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security ToolsSimplify Dev with Complicated Security Tools
Simplify Dev with Complicated Security Tools
Kevin Fealey
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
MarketingArrowECS_CZ
 
DevSecOps - Background, Status and Future Challenges
DevSecOps - Background, Status and Future ChallengesDevSecOps - Background, Status and Future Challenges
DevSecOps - Background, Status and Future Challenges
dsc71656
 
How to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspectiveHow to get the best out of DevSecOps - a security perspective
How to get the best out of DevSecOps - a security perspective
Colin Domoney
 
Ad

More from Deborah Schalm (20)

Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Deborah Schalm
 
Discovering Dark Debt in your Culture
Discovering Dark Debt in your CultureDiscovering Dark Debt in your Culture
Discovering Dark Debt in your Culture
Deborah Schalm
 
A Discussion of Automated Infrastructure Security with a Practical Example
A Discussion of Automated Infrastructure Security with a Practical ExampleA Discussion of Automated Infrastructure Security with a Practical Example
A Discussion of Automated Infrastructure Security with a Practical Example
Deborah Schalm
 
Protect Your Organization Against Known Security Defects
Protect Your Organization Against Known Security DefectsProtect Your Organization Against Known Security Defects
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
Putting the Ops in DevOps
Putting the Ops in DevOpsPutting the Ops in DevOps
Putting the Ops in DevOps
Deborah Schalm
 
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOpsMachine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Deborah Schalm
 
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Post-Equifax: How to Trust But Verify Your Software Supply ChainPost-Equifax: How to Trust But Verify Your Software Supply Chain
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
30 Minutes to a Private Cloud
30 Minutes to a Private Cloud30 Minutes to a Private Cloud
30 Minutes to a Private Cloud
Deborah Schalm
 
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Deborah Schalm
 
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Top 5 Considerations for Operating a Kubernetes Environment at ScaleTop 5 Considerations for Operating a Kubernetes Environment at Scale
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Deborah Schalm
 
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Deborah Schalm
 
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
Deborah Schalm
 
Application Discovery! The Gift That Keeps on Giving
Application Discovery! The Gift That Keeps on GivingApplication Discovery! The Gift That Keeps on Giving
Application Discovery! The Gift That Keeps on Giving
Deborah Schalm
 
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Top 5 Challenges in Scaling DevOps in Brownfield EnvironmentsTop 5 Challenges in Scaling DevOps in Brownfield Environments
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Deborah Schalm
 
The Coming Earthquake in WebSphere Application Server Configuration Management
The Coming Earthquake in WebSphere Application Server Configuration ManagementThe Coming Earthquake in WebSphere Application Server Configuration Management
The Coming Earthquake in WebSphere Application Server Configuration Management
Deborah Schalm
 
Planet of the APIs: Monitoring Transactions in the Wild
Planet of the APIs: Monitoring Transactions in the WildPlanet of the APIs: Monitoring Transactions in the Wild
Planet of the APIs: Monitoring Transactions in the Wild
Deborah Schalm
 
Get Loose! Microservices and Loosely Coupled Architectures
Get Loose! Microservices and Loosely Coupled ArchitecturesGet Loose! Microservices and Loosely Coupled Architectures
Get Loose! Microservices and Loosely Coupled Architectures
Deborah Schalm
 
Proactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the WinProactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the Win
Deborah Schalm
 
No Tool is an Island: Building DevOps into your business
No Tool is an Island: Building DevOps into your businessNo Tool is an Island: Building DevOps into your business
No Tool is an Island: Building DevOps into your business
Deborah Schalm
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Exploring Prometheus: Combining Metrics and Alerting to Improve Incident Mana...
Deborah Schalm
 
Discovering Dark Debt in your Culture
Discovering Dark Debt in your CultureDiscovering Dark Debt in your Culture
Discovering Dark Debt in your Culture
Deborah Schalm
 
A Discussion of Automated Infrastructure Security with a Practical Example
A Discussion of Automated Infrastructure Security with a Practical ExampleA Discussion of Automated Infrastructure Security with a Practical Example
A Discussion of Automated Infrastructure Security with a Practical Example
Deborah Schalm
 
Protect Your Organization Against Known Security Defects
Protect Your Organization Against Known Security DefectsProtect Your Organization Against Known Security Defects
Protect Your Organization Against Known Security Defects
Deborah Schalm
 
Putting the Ops in DevOps
Putting the Ops in DevOpsPutting the Ops in DevOps
Putting the Ops in DevOps
Deborah Schalm
 
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOpsMachine Learning to Turbo-Charge the Ops Portion of DevOps
Machine Learning to Turbo-Charge the Ops Portion of DevOps
Deborah Schalm
 
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Post-Equifax: How to Trust But Verify Your Software Supply ChainPost-Equifax: How to Trust But Verify Your Software Supply Chain
Post-Equifax: How to Trust But Verify Your Software Supply Chain
Deborah Schalm
 
30 Minutes to a Private Cloud
30 Minutes to a Private Cloud30 Minutes to a Private Cloud
30 Minutes to a Private Cloud
Deborah Schalm
 
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Taking DevOps Monitoring to the Next Level - The 5 Step Guide to Monitoring N...
Deborah Schalm
 
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Top 5 Considerations for Operating a Kubernetes Environment at ScaleTop 5 Considerations for Operating a Kubernetes Environment at Scale
Top 5 Considerations for Operating a Kubernetes Environment at Scale
Deborah Schalm
 
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Is a Monolith Standing in the Way of Your Digital Transformation? Refactor fo...
Deborah Schalm
 
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
EMA: Ten Priorities for Hybrid Cloud, Containers and DevOps in 2017
Deborah Schalm
 
Application Discovery! The Gift That Keeps on Giving
Application Discovery! The Gift That Keeps on GivingApplication Discovery! The Gift That Keeps on Giving
Application Discovery! The Gift That Keeps on Giving
Deborah Schalm
 
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Top 5 Challenges in Scaling DevOps in Brownfield EnvironmentsTop 5 Challenges in Scaling DevOps in Brownfield Environments
Top 5 Challenges in Scaling DevOps in Brownfield Environments
Deborah Schalm
 
The Coming Earthquake in WebSphere Application Server Configuration Management
The Coming Earthquake in WebSphere Application Server Configuration ManagementThe Coming Earthquake in WebSphere Application Server Configuration Management
The Coming Earthquake in WebSphere Application Server Configuration Management
Deborah Schalm
 
Planet of the APIs: Monitoring Transactions in the Wild
Planet of the APIs: Monitoring Transactions in the WildPlanet of the APIs: Monitoring Transactions in the Wild
Planet of the APIs: Monitoring Transactions in the Wild
Deborah Schalm
 
Get Loose! Microservices and Loosely Coupled Architectures
Get Loose! Microservices and Loosely Coupled ArchitecturesGet Loose! Microservices and Loosely Coupled Architectures
Get Loose! Microservices and Loosely Coupled Architectures
Deborah Schalm
 
Proactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the WinProactive Monitoring: Playing Offense for the Win
Proactive Monitoring: Playing Offense for the Win
Deborah Schalm
 
No Tool is an Island: Building DevOps into your business
No Tool is an Island: Building DevOps into your businessNo Tool is an Island: Building DevOps into your business
No Tool is an Island: Building DevOps into your business
Deborah Schalm
 
Scale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBeesScale Continuous Deployment to Production with DeployHub and CloudBees
Scale Continuous Deployment to Production with DeployHub and CloudBees
Deborah Schalm
 
Ad

Recently uploaded (20)

LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
Interactive odoo dashboards for sales, CRM , Inventory, Invoice, Purchase, Pr...
AxisTechnolabs
 
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Proactive Vulnerability Detection in Source Code Using Graph Neural Networks:...
Ranjan Baisak
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 

Take Control: Design a Complete DevSecOps Program

  • 1. © 2017 WhiteHat Security, Inc. Take Control: Design a Complete DevSecOps Program Siamak Pazirandeh Chief Architect WhiteHat Security Inc.
  • 2. © 2017 WhiteHat Security, Inc. 2 Siamak Pazirandeh Chief Architect Founding Engineer for over 14 years at WhiteHat Security Inc. Specialized in DAST (Dynamic Application Security Testing), scalability, and deployment automation.
  • 3. © 2017 WhiteHat Security, Inc. 3 About WhiteHat Security 150+ TOP SECURITY RESEARCHERS Santa Clara Houston Belfast
  • 4. © 2017 WhiteHat Security, Inc. 4
  • 5. © 2017 WhiteHat Security, Inc. Gartner, 01 February 2017, “Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient Security”, Elizabeth Kim, Deborah Kish, Avivah Litan, Ruggero Contu, Perry Carpenter, Sid Deshpande, Lawrence Pingree, Eric Ahlm, Jacqueline Heng, Dale Gardner By 2020, 60% of digital businesses will suffer major service failures due to IT security teams' inability to manage digital risk. It’s All About Risk 5
  • 6. © 2017 WhiteHat Security, Inc. Earlier Security = Saving $$ 6
  • 7. © 2017 WhiteHat Security, Inc. Agenda  What is DevSecOps?  Basics of a Security Program  Adding Security Checks into your DevOps Chains  Example Scenarios 7
  • 8. © 2017 WhiteHat Security, Inc. Agenda  What is DevSecOps?  Basics of a Security Program  Adding Security Checks into your DevOps chains  Example scenarios 8
  • 9. © 2017 WhiteHat Security, Inc. Forces behind the DevSecOps movement  Agile development dictates fast pace  IT managed Infrastructure needs to keep up  Must automate as much as possible in : development, deployment, and operational environment 9
  • 10. © 2017 WhiteHat Security, Inc. DevSecOps  IT teams responsible for Security  Software iterates faster than IT can keep up  DevSecOps : Weaves security into the fabric of your SDLC  DevSecOps is to Security as DevOps is to IT 10
  • 11. © 2017 WhiteHat Security, Inc. Agenda  What is DevSecOps  Basics of a Secure Development  Adding Security Checks into your DevOps chains  Example scenarios 11
  • 12. © 2017 WhiteHat Security, Inc. The Challenge of Secure Software Development • Security not the core competency for most • Most organizations do not foster secure coding culture • Most devs are not trained in Secure Coding practices • Most devs are not supported well for Secure Coding • Security often an after-thought 12
  • 13. © 2017 WhiteHat Security, Inc. Basics of Secure Development  Understand your business risk exposure  What is your company’s SDLC and DevOps maturity level?  What is your architectural complexity?  What is your current security stance?  Answer, Document, Review periodically 13
  • 14. © 2017 WhiteHat Security, Inc. Basics of Secure Development  Produce a supportive environment  Customize security documentation to your tech-stack  All tiers of an application (UI, APIs, Data-Access, Business Logic) need to be developed with Security in mind  Security practices need to be reinforced early and often  Developer Training  Come up with a Secure Development policy 14
  • 15. © 2017 WhiteHat Security, Inc. Security Practice Checklist  1. Verify for Security Early and Often  2. Parameterize Queries  3. Encode Data  4. Validate All Inputs  5. Implement Identity and Authentication Controls  6. Implement Appropriate Access Controls  7. Protect Data  8. Implement Logging and Intrusion Detection  9. Use Security Frameworks and Libraries  10. Error and Exception Handling 15
  • 16. © 2017 WhiteHat Security, Inc. Agenda  What is DevSecOps  Basics of a Security Program  Adding Security Checks into your DevOps chains  Example scenarios 16
  • 17. © 2017 WhiteHat Security, Inc. Reframing Security as a DevOps Initiative 17
  • 18. © 2017 WhiteHat Security, Inc. DevSecOps – The Beginning So, what if we …  Treat security testing like feature testing  Incorporate security requirement and checks into SDLC  Use available tooling to tie vulnerability scanning into DevOps build chains  Automate defect state management 18
  • 19. © 2017 WhiteHat Security, Inc. Practice Security Throughout the SDLC 19
  • 20. © 2017 WhiteHat Security, Inc. 20 A Typical Development Cycle Code Repo Code / Developer Run Tests Build Artifacts Object Registry Team Integration QA Integration Pipeline Nightly Stage
  • 21. © 2017 WhiteHat Security, Inc. 21 Incorporate Security Checks Code Repo Run Tests 2 Pull-Request: Code Review Static Analysis Security Unit Tests Build Artifacts Object Registry Team Integration Integration QA Pipeline Jenkins (Nightly) Stage 1 Pre-Commit: Static Analysis Security Unit Tests IDE integration 3 Integration: Dynamic testing Result Verification File Vulnerability Tickets 5 Release: Production safe Dynamic testing File Vulnerability Tickets WAF / RASP Rules 6 WAF/RASP Pass, merge 4 QA Integration: Dynamic testing Result Verification Production
  • 22. © 2017 WhiteHat Security, Inc. DevSecOps Trigger Points 1. Static scanning during development 2. Pull-Requests: Static scans of data-flow, semantic and configurational 3. Integration branch: Dynamic scanning 4. QA Release Candidate Integration: Dynamic scanning 5. Production Acceptance : Production-safe dynamic scanning 6. Post-Production: RASP (runtime application self-protection,) WAF (Web App Firewalls) both need rules updated – automation is better 22
  • 23. © 2017 WhiteHat Security, Inc. Scenario 1 – Small Organization/App Assume a Single Repo with a few components :  UI static JS client-side APP  REST API  Data Interface - SQL Layer 23
  • 24. © 2017 WhiteHat Security, Inc. Scenario 1 – Small Application Code Repo Code / Developer Run Tests PR hook Build Artifacts Stage Prod • Integration Tests • Performance • Security 1 Static analysis IDE integration Pre-commit checklist 2 Static Analysis Quick Feedback analysis Verification a Challenge 3 Dynamic Analysis Poll for results Verification a Challenge 24
  • 25. © 2017 WhiteHat Security, Inc. Create a supportive dev environment Code Repo Code / Developer Run Tests PR hook Build Artifacts Stage Prod • Integration Tests • Performance • Security 1 Static analysis IDE integration Pre-commit checklist 2 Static Analysis Quick Feedback analysis Verification a Challenge 3 Dynamic Analysis Poll for results Verification a Challenge 25
  • 26. © 2017 WhiteHat Security, Inc. Security Integrated tools for developers
  • 27. © 2017 WhiteHat Security, Inc. “I fire up my IDE and triage my issues…” • Search application vulnerabilities
  • 28. © 2017 WhiteHat Security, Inc. “I fire up my IDE and triage my issues…” • Search application vulnerabilities • Step through vulnerability in code
  • 29. © 2017 WhiteHat Security, Inc. “I fire up my IDE and triage my issues…” • Search application vulnerabilities • Step through vulnerability in code • Review remediation guidance
  • 30. © 2017 WhiteHat Security, Inc. “I fire up my IDE and triage my issues…” • Search application vulnerabilities • Step through vulnerability in code • Review remediation guidance • Ask for help from TRC
  • 31. © 2017 WhiteHat Security, Inc. “I fire up my IDE and triage my issues…” • Search application vulnerabilities • Step through vulnerability in code • Review remediation guidance • Ask for help from TRC • Apply Directed Remediation patch if available
  • 32. © 2017 WhiteHat Security, Inc. Scenario 1 – Small Application Code Repo Code / Developer Run Tests PR hook Build Artifacts Stage Prod • Integration Tests • Performance • Security 1 Training, Documentation Dissemination Code Reviews 2 Static Analysis Quick Feedback analysis Verification a Challenge 3 Dynamic Analysis Poll for results Verification a Challenge 32
  • 33. © 2017 WhiteHat Security, Inc. Scenario 1 – Small Application Code Repo Code / Developer Run Tests PR hook Build Artifacts Stage Prod • Integration Tests • Performance • Security 1 Training, Documentation Dissemination Code Reviews 2 Static Analysis Quick Feedback analysis Verification a Challenge 3 Dynamic Analysis Poll for results Verification a Challenge 33
  • 34. © 2017 WhiteHat Security, Inc. Example: API Integration to Trigger a Dynamic Scan PUT https://sentinel.whitehatsec.com/api/site/6/scan_schedule { "schedule":{ "name":"Scan Once Now”, "specs":[ { "type":"scan-once-now” } ] } } 200 OK { "creator": 524, "job": { "id": "10" }, "specs": [ { "id": "1503", "type": "single", "cron_spec": "53 14 15 6 * 2017" } ], "timezone": "America/Los_Angeles", "href": "/api/job/10/schedule", "id": "1503", "api-version": 2, "name": "Scan Once Now" } 34
  • 35. © 2017 WhiteHat Security, Inc. Example: API Integration to Query for Results GET https://sentinel.whitehatsec.com/api/job/10/instance/1402?format=json 200 OK { "end": 1497564375, "duration": 4, "id": 1402, "timestamp": 1497564358, "requested_status": "", "job": 10, "status": "completed", "begin": 1497564371, "href": "/api/job/10/instance/1402“ } 35
  • 36. © 2017 WhiteHat Security, Inc. Example: API Integration to Find Vulnerabilities GET https://sentinel.whitehatsec.com/api/vuln?query_site=6&query_status=open&format=json 200 OK { "collection": [ { "status": "open", "site": "6", "opened": "2017-06-15T19:07:54Z", "threat": "2", "url": "testsite.localdomain.lan/app.cgi?var=<script>alert(123)<%2Fscript>", "id": "260", "modified": "2017-06-15T22:06:12Z", "first_opened": "2017-04-15T19:07:54Z", "site_name": "Testsite", "service_level_abbr": "BE", "accepted": 0, "found": "2017-04-15T19:07:54Z", … … "severity": "3", "score": 8, "class": ”Cross Site Scripting", "href": "/api/vuln/260", "impact": 3 } ] } 36
  • 37. © 2017 WhiteHat Security, Inc. 37 Plugins Simplify Triggering Interactions
  • 38. © 2017 WhiteHat Security, Inc. 38 Plugins = Automate Ticket Generation
  • 39. © 2017 WhiteHat Security, Inc. DevSecOps Pain Points  Scanner Result Verification, False Positives  Static / Dynamic Scan Speeds  Results Need Interpretation and Prioritization within Business Context 39
  • 40. © 2017 WhiteHat Security, Inc. Scenario 2 – Medium-Size Organization/App DevOps 1 -> team integration branch (team integration commit hooks) • Black Box dynamic testing in QA • Business logic assessment • Pen testing Team needs to vet results, assess risk, prioritize, apply sec policy to green/red light) DevOps 2 -> team integration branch QA integration — Prod push • Production safe dynamic testing • Remediate using WAF technologies for short term • Queue up for fixing original ticket Team needs to vet results, prioritize, generate tickets, apply company security policy to bubble up priorities Each team does pre-commit hooks static analysis, verify results, accept/fix per security policy 40
  • 41. © 2017 WhiteHat Security, Inc. Scenario 2 – Common Challenges Static analysis of individual repositories is too narrow-minded (think micro-services) Verification of results is time-consuming Increasing need for analytics and overall risk analysis 41
  • 42. © 2017 WhiteHat Security, Inc. Scenario 3 - Large Company – Mature DevOps 42 ➢ Compliance is more a factor ➢ Policy & records need documentation ➢ Risk management platforms can be integrated with vulnerability data ➢ Reports need to be available on-hand for audits
  • 43. © 2017 WhiteHat Security, Inc. Risk Management: Asset Enumeration Evaluate Operational Risk, enumerate assets, produce security policies for different groups  Customize policies and requirements based risk profile of asset  Platforms like RSA’s Archer evaluate your overall risk and integrate with security vendors  Integrations between your Risk model (BI, VM) software and scanning services 43
  • 44. © 2017 WhiteHat Security, Inc. Asset Enumeration Example: Fictitious Healthcare company ➢ Documentation content for customers (Low risk) ➢ Customer Health data portal (High risk, HIPAA) ➢ Online personalized medical appliances shopping website (High Risk, PCI, HIPAA) ➢ Backend Insurance/EHR Processing/B2B integrations (High risk, HIPAA) ➢ Backend statistics integrations for website usage statistics (Medium Risk, Non- authenticated content only) ➢ New Mobile App portal (High risk, HIPAA) 44
  • 45. © 2017 WhiteHat Security, Inc. DevSecOps Integrations & Touchpoints: Healthcare Example cont. ✓ Add ticketing system checkbox for architectural security review by feature. ✓ Add code review checkboxes on “pull-requests”. Integrate with ticketing. ✓ Codify security tests as part of unit/integration testing where possible. ✓ Tie static analysis security testing and make a gating factor for code check-ins. Integrate with Tickets. ✓ Require Manager approval to by-pass security test failures. ✓ Test QA integration branches with verified security testing services – QA teams codify negative security tests for verified vulnerabilities. 45
  • 46. © 2017 WhiteHat Security, Inc.© 2017 WhiteHat Security, Inc. Other Resources How about mobile? https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 OWASP Top 10 in practice, great page : https://www.owasp.org/index.php/OWASP_Top_10/Mapping_to_W HID OWASP site also has links to many tools that can be integrated into your SDLC automations 46
  • 47. © 2017 WhiteHat Security, Inc. Thank You Siamak Pazirandeh WhiteHat Security Inc. [email protected] 47