SlideShare a Scribd company logo
1 of 43
Download to read offline
MILAN 20/21.11.2015
Continuous Security: ZAP your security
issues now!
Carlo Bonamico & Gabriele Guasco
carlo.bonamico@nispro.it gabriele.guasco@nispro.it
@carlobonamico @gabrieleguasco
NIS s.r.l.
http://www.nispro.it
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
define Security
requirements at
the start
do some security
tests at the end
write your code …
faster than light
What’s in this Security Sandwich?
https://www.thoughtworks.com/radar/techniques/security-sandwich
Application Security
Ensuring Application
guarantees
● Confidentiality
● Integrity
● Availability
● Accountability
of the Information
it processes
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
why this sandwich
is not so good?
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Usually it’ just half-a-sandwich
no security design
no security tests
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Does not keep up with Agile processes
where new Design choices, and even Requirements,
emerge through the project lifespan
and this includes their impact on Security
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
When problems are discovered...
there is no more time ...or no more $$$
bug fixing starts after final PenTest
near planned release date
# of vulnerabilities # of vulnerabilities
theory sad reality
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
The more time passes
the more cost-to-fix increases
● because the change
implies revising
components writtens
months before
● possibly by developers
no more with the team
● because the complexity
of the project has
increased
● steep cost / delay
increase after release
to production
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
With the security sandwich it’
s often too late
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Security
Embed Security validation (bread) across the entire Software
Development Lifecycle
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Security - Analysis & Design
At project start
- evaluate Risk Level and potential threats (Threat Model)
- define high level Security Requirements and guidelines
- evaluate Team need for Security Training
High level Architecture Review
- ask for security expert as an advisor
- good ROI because you can solve root cause on many security problems in
design phase
Design Reviews
- when changing security sensitive parts
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Security - Implementation
Detail Design and Implementation
- follow Secure Coding Principles
At first “vertical slice” prototype
- Vulnerability Assessment & Pen Test
- check for implementation errors
on design decisions,
- avoid errors in future implementation
add feature / component 1
- non-regression security tests
...
add feature / component N
- non-regression security tests
Secure Coding Principles
Do not trust inputs
Minimize attack surface area (and
window of opportunity)
Establish secure defaults
Principle of Least privilege
Principle of Defense in depth
Fail securely
Don’t trust services
Separation of duties
Avoid security by obscurity
Keep security simple
Fix security issues correctly
If you can't protect, detect
Get your users involved
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Security - Test & Production
At pre-production stage
- full Vulnerability Assessment & Pen Test
- pre-allocate time for final fixing
In production
- log application - level Security Events
- failed logins, unauthorized requests
- accesses from unusual clients
- Keep Users Involved
- give them information needed to detect potential threats
Updates and new releases
- non-regression security tests
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Why is this better?
Identify Design flaws and vulnerabilities as they occur
Easier (and cheaper) to fix within their context
vs
The team constantly learns about security issues and fixes
and can apply this experience in the rest of the project
vs
There are 15
vulnerabilities in your
50kloc codebase
There is 1 vulnerability
in feature X that you
committed yesterday
Nice VA report, but
starting tomorrow I’ll
move to another project
That’s interesting… we’
ll avoid this in the next
features
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
lines of code
security bugs
end-of-project
vulnerability assessment
security bugs
to be fixed …
in no time :-)
Security sandwich approach
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
lines of
code security bugs
vulnerability assessment
Continuous Security: tests & fix during SDLC
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Security tests during SDLC
types of bugs
lines of code
non regression
security tests
d-day for pre-production release
(pentest)
security bugs
found with
“simple” test
and/or with
known solution
security bugs discovered
during vuln. assesment
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Residual Vulnerabilities will never be 0
Residual vulnerabilities
- detected but to
complex to fix
- NOT detected by
VA
- there is no
magic see-it-
all tool!
Need a Risk Management approach
minimize probability - minimize impact
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Security recipe in short
● Security throughout the whole SDLC
● Complementary techniques and tools
(again, sorry there ‘s no single-magic-silver-bullet)
● Synergy of the whole Team + external security Experts
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Objections:
Security through the whole SDLC
● I don’t have time to do security tests too
● Security is an overhead
Different techniques and instruments
● I don’t have the tools
● Tools costs $$$
Synergy of the whole team + external security experts
● team doesn’t have the skills
● cannot hire Security Experts for a long time
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
To stay healthy….
in many cases
you can check on
your own
sometimes you
need super-
experts
periodically you
need an
advice/review
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
To stay secure...
in many cases
you can check on
your own
sometimes you
need super-
experts
periodically you
need an
advice/review
Developer , IDE,
C.I. server
Professional
PenTester
Security-trained
Architect
Besides, many checks can also be
automatic or semi-automatic
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Manual validation
● Better Security Requirements with
OWASP Application Security Verification Standard (ASVS)
○ standardized criteria for common security Use Cases: authentication,
authorization, …
○ increasing levels of protection
■ web portals vs medical records
● Review by Security Architect
Promising approach to partially automate Security
Requirement definition and tracking http:
//securitycompass.com/sdelements
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Manual validations & test
● Design review
● Full Vulnerability Assessment & Penetration Test
○ at 1st prototype
○ at pre-production stage
● Focused Vulnerability Assessment everytime a new
“integration point” is introduced
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Automatic test
Static Analysis with FindSecurityBugs
Integrated with IDE
Run by the developer while
writing code
Very reliable for SQL Injections
and dangerous API calls
Can annotate and disable false
positives
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Automatic test - Owasp ZAP Proxy
Intercepts and analyzes all requests to the application, then:
● spidering
(with context)
● passive scan
● active attack
● ….and more
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Automatic test with ZAP
Use of ZAP to check http security headers (X-XSS
protection, X-Frame-options, Content-Security-Policy, etc.)
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Automatic test with ZAP
Use of ZAP to check http cookie parameters (flag http-only, flag secure, scope,
lifetime)
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Automatic test
SSL settings active test
Open Source: https://github.com/rbsec/sslscan & ZAP plugins
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Semi-automatic test: components
(execution is “simple”, results needs review)
owasp
dependency
check
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Semi-automatic test Configuration
and deployment check
●
● SCREENSHOT
port scanning (nmap)
vulnerability scanning
OpenVAS,
Nessus (Commercial)
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Security Tests vs Continuous Integration
and Continuous Delivery
DEV IDE
C.I / C.D.
Server
Test EnvSCM
Repo
Artifact
Repo
PRE-PROD
Env
PROD
Env
Internet OSS
Repo
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Integration - Static Analysis
Jenkins running FindSecurityBugs at each build
Effective for
● avoiding dangerous APIs
● detecting SQL injection
Aim at constantly bring down
count to zero
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Integration - Comp. Security
Jenkins running Dependency Check at each build
C.I / C.D.
Server
Artifact
Repo
OSS
Repo
Even more sophisticated Dependency filtering and analysis in tools like Nexus Lifecycle (Commercial)
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Continuous Integration - ZAP
Jenkins running ZAP daily
Jenkins Job
vb
Build WAR
Deploy
Start ZAP,
Webapp
Functional
Tests
Trigger
ZAP attack
Stop Server
ZAP
Publish
Report
ZAP Server
(e.g. Tomcat)
WebAppProxy
Spider /
Attack
REST
API
xml / html
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Phase Activity Who? Tools / Methods Type
Analysis Define
Requirements
Dev, Analyst
Security Architect
Owasp ASVS
Thread Model, Risk review
Manual
Design Architecture - High
Level Design
Review
Security Architect
and/or Expert
Diagrams, Documents,
Secure Coding Principles
Manual
Implementation Write Code Developers Secure Coding Principles Manual
Implementation Vuln. Assessment &
Pen Test
Security Expert ZAP, Nmap, Nessus
(commercial), many others
Manual
Semi-
AutoAutom
atic
Implementation Add other features Developers Static Code Analysis in IDE
FindSecBugs, ZAP,
DepCheck
Mostly
Automatic
Test Vulnerability
Assessment & Pen
Test
Security Expert ZAP, Nmap, Nessus
(commercial), many others
Manual
Semi-
autoAutom
atic
Production Monitoring Sysadmin/DevOps Log Application-Level
Security Events
Semi-auto
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Remember three things
1. Fail Fast …. validate security & perform tests as early as
possible
2. Automate where you can …
you’ll earn more time to focus on tougher security issues
3. don’t skip periodic expert Design Review
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
References
Owasp Secure Coding Principles
● https://www.owasp.org/index.php/Secure_Coding_Principles
OWASP Testing Guide
● https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
OWASP Application Security Verification Standard
https://www.owasp.org/index.php/Category:
OWASP_Application_Security_Verification_Standard_Project
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
The Tools - Open Source
ZAP
● https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Jenkins
● https://jenkins-ci.org/
Plugins
● https://wiki.jenkins-ci.org/display/JENKINS/OWASP+Dependency-Check+Plugin
● https://wiki.jenkins-ci.org/display/JENKINS/Static+Code+Analysis+Plug-ins
● https://wiki.jenkins-ci.org/display/JENKINS/ZAProxy+Plugin
Find Security Bugs
● http://h3xstream.github.io/find-sec-bugs/
Dependency Check
● https://www.owasp.org/index.php/OWASP_Dependency_Check
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
The Tools - Commercial
Coverity
● http://www.coverity.com/
Nessus
● http://www.tenable.com/products/nessus-vulnerability-scanner
Sonatype Nexus Lifecycle
● http://www.sonatype.com/nexus/product-overview/nexus-lifecycle
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
Leave your feedback on Joind.in!
https://m.joind.in/event/codemotion-milan-2015
Interested?
● attend our Web Application Security / Continuous Delivery trainings
● engage us for Design/Code Reviews, Vulnerability Assessments & team mentoring
● Read more on
○ http://www.nispro.it
○ http://www.slideshare.net/carlo.bonamico
● Follow us on twitter
○ @nis_srl @carlobonamico @gabrieleguasco
○ updates on Security, AngularJS, Continuous Delivery
Questions? carlo.bonamico@nispro.it - gabriele.guasco@nispro.it
MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
lines of
code
security bugs
vulnerability assessment
Security sandwich approach
bug growing rate

More Related Content

What's hot

IPNEC - Security Services
IPNEC - Security ServicesIPNEC - Security Services
IPNEC - Security ServicesAbdus Saboor
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Securitygjdevos
 
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...AdaCore
 
Security champions v1.0
Security champions v1.0Security champions v1.0
Security champions v1.0Dinis Cruz
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps TransformationMichele Chubirka
 
DevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartDevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartPatricia Aas
 

What's hot (6)

IPNEC - Security Services
IPNEC - Security ServicesIPNEC - Security Services
IPNEC - Security Services
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
 
Security champions v1.0
Security champions v1.0Security champions v1.0
Security champions v1.0
 
Security's DevOps Transformation
Security's DevOps TransformationSecurity's DevOps Transformation
Security's DevOps Transformation
 
DevSecOps for Developers: How To Start
DevSecOps for Developers: How To StartDevSecOps for Developers: How To Start
DevSecOps for Developers: How To Start
 

Viewers also liked

Paolo Passeri - A Multi Layered Approach to Threat Intelligence
Paolo Passeri - A Multi Layered Approach to Threat IntelligencePaolo Passeri - A Multi Layered Approach to Threat Intelligence
Paolo Passeri - A Multi Layered Approach to Threat IntelligenceCodemotion
 
Engage and retain users in the mobile world
Engage and retain users in the mobile worldEngage and retain users in the mobile world
Engage and retain users in the mobile worldCodemotion
 
Tech Webinar: Angular 2, Introduction to a new framework
Tech Webinar: Angular 2, Introduction to a new frameworkTech Webinar: Angular 2, Introduction to a new framework
Tech Webinar: Angular 2, Introduction to a new frameworkCodemotion
 
RE 2015 ecosystems tutorial
RE 2015 ecosystems tutorialRE 2015 ecosystems tutorial
RE 2015 ecosystems tutorialXavier Franch
 
Cercando il cigno giusto by Jacopo Romei
Cercando il cigno giusto by Jacopo RomeiCercando il cigno giusto by Jacopo Romei
Cercando il cigno giusto by Jacopo RomeiCodemotion
 
Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin Codemotion
 
ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...
ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...
ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...Codemotion
 
Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015
Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015
Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015Codemotion
 
Introduction to Mobile Development with jQuery Mobile
Introduction to Mobile Development with jQuery MobileIntroduction to Mobile Development with jQuery Mobile
Introduction to Mobile Development with jQuery MobileCodemotion
 
Multyplatform and mono part 2 - Matteo Nicolotti
Multyplatform and mono part 2 - Matteo Nicolotti Multyplatform and mono part 2 - Matteo Nicolotti
Multyplatform and mono part 2 - Matteo Nicolotti Codemotion
 
DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...
DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...
DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...Codemotion
 
Enterprise Java in 2012 and Beyond, by Juergen Hoeller
Enterprise Java in 2012 and Beyond, by Juergen Hoeller Enterprise Java in 2012 and Beyond, by Juergen Hoeller
Enterprise Java in 2012 and Beyond, by Juergen Hoeller Codemotion
 
Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...
Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...
Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...Codemotion
 
Sviluppare Indie Games su Xbox360 con C# e XNA Game Studio
Sviluppare Indie Games su Xbox360 con C# e XNA Game StudioSviluppare Indie Games su Xbox360 con C# e XNA Game Studio
Sviluppare Indie Games su Xbox360 con C# e XNA Game StudioCodemotion
 
L’elefante nella stanza! Affrontare le “known issues” tra tecnici e manager
L’elefante nella stanza! Affrontare le “known issues” tra tecnici e managerL’elefante nella stanza! Affrontare le “known issues” tra tecnici e manager
L’elefante nella stanza! Affrontare le “known issues” tra tecnici e managerCodemotion
 
Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...
Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...
Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...Codemotion
 
Empowering the Mobile Web - Mills
Empowering the Mobile Web - MillsEmpowering the Mobile Web - Mills
Empowering the Mobile Web - MillsCodemotion
 
Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...
Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...
Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...Codemotion
 
Startup in Action
Startup in ActionStartup in Action
Startup in ActionCodemotion
 

Viewers also liked (20)

Paolo Passeri - A Multi Layered Approach to Threat Intelligence
Paolo Passeri - A Multi Layered Approach to Threat IntelligencePaolo Passeri - A Multi Layered Approach to Threat Intelligence
Paolo Passeri - A Multi Layered Approach to Threat Intelligence
 
Engage and retain users in the mobile world
Engage and retain users in the mobile worldEngage and retain users in the mobile world
Engage and retain users in the mobile world
 
Tech Webinar: Angular 2, Introduction to a new framework
Tech Webinar: Angular 2, Introduction to a new frameworkTech Webinar: Angular 2, Introduction to a new framework
Tech Webinar: Angular 2, Introduction to a new framework
 
RE 2015 ecosystems tutorial
RE 2015 ecosystems tutorialRE 2015 ecosystems tutorial
RE 2015 ecosystems tutorial
 
Cercando il cigno giusto by Jacopo Romei
Cercando il cigno giusto by Jacopo RomeiCercando il cigno giusto by Jacopo Romei
Cercando il cigno giusto by Jacopo Romei
 
Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin Raspberry Pi NightHacking by Stephen Chin
Raspberry Pi NightHacking by Stephen Chin
 
ScrumButs
ScrumButsScrumButs
ScrumButs
 
ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...
ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...
ROVINA: Robots for Exploration, Digital Preservation and Visualization of Arc...
 
Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015
Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015
Bitcoin Internals - Gianfranco Fedele - Codemotion Roma 2015
 
Introduction to Mobile Development with jQuery Mobile
Introduction to Mobile Development with jQuery MobileIntroduction to Mobile Development with jQuery Mobile
Introduction to Mobile Development with jQuery Mobile
 
Multyplatform and mono part 2 - Matteo Nicolotti
Multyplatform and mono part 2 - Matteo Nicolotti Multyplatform and mono part 2 - Matteo Nicolotti
Multyplatform and mono part 2 - Matteo Nicolotti
 
DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...
DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...
DESIGN BIOMETRICO PER CASUAL GAMES: tra macchine della verita' e bestie di ca...
 
Enterprise Java in 2012 and Beyond, by Juergen Hoeller
Enterprise Java in 2012 and Beyond, by Juergen Hoeller Enterprise Java in 2012 and Beyond, by Juergen Hoeller
Enterprise Java in 2012 and Beyond, by Juergen Hoeller
 
Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...
Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...
Come creare e manutenere una Styleguide visiva per i tuoi clienti - Fabio Fab...
 
Sviluppare Indie Games su Xbox360 con C# e XNA Game Studio
Sviluppare Indie Games su Xbox360 con C# e XNA Game StudioSviluppare Indie Games su Xbox360 con C# e XNA Game Studio
Sviluppare Indie Games su Xbox360 con C# e XNA Game Studio
 
L’elefante nella stanza! Affrontare le “known issues” tra tecnici e manager
L’elefante nella stanza! Affrontare le “known issues” tra tecnici e managerL’elefante nella stanza! Affrontare le “known issues” tra tecnici e manager
L’elefante nella stanza! Affrontare le “known issues” tra tecnici e manager
 
Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...
Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...
Monitorare le applicazioni: costruire un agent plugin per l’introspezione del...
 
Empowering the Mobile Web - Mills
Empowering the Mobile Web - MillsEmpowering the Mobile Web - Mills
Empowering the Mobile Web - Mills
 
Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...
Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...
Android & Internet of things with Google Cloud Messaging and AppEngine - Orla...
 
Startup in Action
Startup in ActionStartup in Action
Startup in Action
 

Similar to Carlo Bonamico, Gabriele Guasco - Continuous Security: ZAP your security issues now!

Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019Codemotion
 
Agile software security assurance
Agile software security assuranceAgile software security assurance
Agile software security assuranceOllie Whitehouse
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...lior mazor
 
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp
 
Secure Agile SDLC BSides 14 - 2017 - Raphael Denipotti
Secure Agile SDLC BSides 14 - 2017 - Raphael DenipottiSecure Agile SDLC BSides 14 - 2017 - Raphael Denipotti
Secure Agile SDLC BSides 14 - 2017 - Raphael DenipottiRaphael Denipotti
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspectiveDr. Anish Cheriyan (PhD)
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...HackerOne
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security AgileOleg Gryb
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSBWebinars
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Canturk Isci
 
Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016Stefan Streichsbier
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Continuous Delivery in a Legacy Shop—One Step at a Time
Continuous Delivery in a Legacy Shop—One Step at a TimeContinuous Delivery in a Legacy Shop—One Step at a Time
Continuous Delivery in a Legacy Shop—One Step at a TimeTechWell
 
Product Pre Release Security Validation Checklist v1.0
Product Pre Release Security Validation Checklist v1.0Product Pre Release Security Validation Checklist v1.0
Product Pre Release Security Validation Checklist v1.0Mike Horton
 
Building better product security
Building better product securityBuilding better product security
Building better product securityBohdan Serednytskyi
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileOleg Gryb
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 

Similar to Carlo Bonamico, Gabriele Guasco - Continuous Security: ZAP your security issues now! (20)

Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
Kim van Wilgen - Continuous security - Codemotion Amsterdam 2019
 
Agile software security assurance
Agile software security assuranceAgile software security assurance
Agile software security assurance
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?
 
Secure Agile SDLC BSides 14 - 2017 - Raphael Denipotti
Secure Agile SDLC BSides 14 - 2017 - Raphael DenipottiSecure Agile SDLC BSides 14 - 2017 - Raphael Denipotti
Secure Agile SDLC BSides 14 - 2017 - Raphael Denipotti
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...How GitLab and HackerOne help organizations innovate faster without compromis...
How GitLab and HackerOne help organizations innovate faster without compromis...
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security Agile
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Continuous Delivery in a Legacy Shop—One Step at a Time
Continuous Delivery in a Legacy Shop—One Step at a TimeContinuous Delivery in a Legacy Shop—One Step at a Time
Continuous Delivery in a Legacy Shop—One Step at a Time
 
Product Pre Release Security Validation Checklist v1.0
Product Pre Release Security Validation Checklist v1.0Product Pre Release Security Validation Checklist v1.0
Product Pre Release Security Validation Checklist v1.0
 
Building better product security
Building better product securityBuilding better product security
Building better product security
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security Agile
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Container Security Scanning by Timo Pagel
Container Security Scanning by Timo PagelContainer Security Scanning by Timo Pagel
Container Security Scanning by Timo Pagel
 

More from Codemotion

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Codemotion
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyCodemotion
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaCodemotion
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserCodemotion
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Codemotion
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Codemotion
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Codemotion
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 - Codemotion
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Codemotion
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Codemotion
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Codemotion
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Codemotion
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Codemotion
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Codemotion
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Codemotion
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Codemotion
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Codemotion
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Codemotion
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Codemotion
 

More from Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Carlo Bonamico, Gabriele Guasco - Continuous Security: ZAP your security issues now!

  • 1. MILAN 20/21.11.2015 Continuous Security: ZAP your security issues now! Carlo Bonamico & Gabriele Guasco carlo.bonamico@nispro.it gabriele.guasco@nispro.it @carlobonamico @gabrieleguasco NIS s.r.l. http://www.nispro.it
  • 2. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
  • 3. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco define Security requirements at the start do some security tests at the end write your code … faster than light What’s in this Security Sandwich? https://www.thoughtworks.com/radar/techniques/security-sandwich Application Security Ensuring Application guarantees ● Confidentiality ● Integrity ● Availability ● Accountability of the Information it processes
  • 4. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco why this sandwich is not so good?
  • 5. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Usually it’ just half-a-sandwich no security design no security tests
  • 6. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Does not keep up with Agile processes where new Design choices, and even Requirements, emerge through the project lifespan and this includes their impact on Security
  • 7. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco When problems are discovered... there is no more time ...or no more $$$ bug fixing starts after final PenTest near planned release date # of vulnerabilities # of vulnerabilities theory sad reality
  • 8. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco The more time passes the more cost-to-fix increases ● because the change implies revising components writtens months before ● possibly by developers no more with the team ● because the complexity of the project has increased ● steep cost / delay increase after release to production
  • 9. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco With the security sandwich it’ s often too late
  • 10. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Security Embed Security validation (bread) across the entire Software Development Lifecycle
  • 11. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Security - Analysis & Design At project start - evaluate Risk Level and potential threats (Threat Model) - define high level Security Requirements and guidelines - evaluate Team need for Security Training High level Architecture Review - ask for security expert as an advisor - good ROI because you can solve root cause on many security problems in design phase Design Reviews - when changing security sensitive parts
  • 12. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Security - Implementation Detail Design and Implementation - follow Secure Coding Principles At first “vertical slice” prototype - Vulnerability Assessment & Pen Test - check for implementation errors on design decisions, - avoid errors in future implementation add feature / component 1 - non-regression security tests ... add feature / component N - non-regression security tests Secure Coding Principles Do not trust inputs Minimize attack surface area (and window of opportunity) Establish secure defaults Principle of Least privilege Principle of Defense in depth Fail securely Don’t trust services Separation of duties Avoid security by obscurity Keep security simple Fix security issues correctly If you can't protect, detect Get your users involved
  • 13. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Security - Test & Production At pre-production stage - full Vulnerability Assessment & Pen Test - pre-allocate time for final fixing In production - log application - level Security Events - failed logins, unauthorized requests - accesses from unusual clients - Keep Users Involved - give them information needed to detect potential threats Updates and new releases - non-regression security tests
  • 14. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Why is this better? Identify Design flaws and vulnerabilities as they occur Easier (and cheaper) to fix within their context vs The team constantly learns about security issues and fixes and can apply this experience in the rest of the project vs There are 15 vulnerabilities in your 50kloc codebase There is 1 vulnerability in feature X that you committed yesterday Nice VA report, but starting tomorrow I’ll move to another project That’s interesting… we’ ll avoid this in the next features
  • 15. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco lines of code security bugs end-of-project vulnerability assessment security bugs to be fixed … in no time :-) Security sandwich approach
  • 16. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco lines of code security bugs vulnerability assessment Continuous Security: tests & fix during SDLC
  • 17. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Security tests during SDLC types of bugs lines of code non regression security tests d-day for pre-production release (pentest) security bugs found with “simple” test and/or with known solution security bugs discovered during vuln. assesment
  • 18. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Residual Vulnerabilities will never be 0 Residual vulnerabilities - detected but to complex to fix - NOT detected by VA - there is no magic see-it- all tool! Need a Risk Management approach minimize probability - minimize impact
  • 19. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Security recipe in short ● Security throughout the whole SDLC ● Complementary techniques and tools (again, sorry there ‘s no single-magic-silver-bullet) ● Synergy of the whole Team + external security Experts
  • 20. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco
  • 21. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Objections: Security through the whole SDLC ● I don’t have time to do security tests too ● Security is an overhead Different techniques and instruments ● I don’t have the tools ● Tools costs $$$ Synergy of the whole team + external security experts ● team doesn’t have the skills ● cannot hire Security Experts for a long time
  • 22. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco To stay healthy…. in many cases you can check on your own sometimes you need super- experts periodically you need an advice/review
  • 23. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco To stay secure... in many cases you can check on your own sometimes you need super- experts periodically you need an advice/review Developer , IDE, C.I. server Professional PenTester Security-trained Architect Besides, many checks can also be automatic or semi-automatic
  • 24. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Manual validation ● Better Security Requirements with OWASP Application Security Verification Standard (ASVS) ○ standardized criteria for common security Use Cases: authentication, authorization, … ○ increasing levels of protection ■ web portals vs medical records ● Review by Security Architect Promising approach to partially automate Security Requirement definition and tracking http: //securitycompass.com/sdelements
  • 25. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Manual validations & test ● Design review ● Full Vulnerability Assessment & Penetration Test ○ at 1st prototype ○ at pre-production stage ● Focused Vulnerability Assessment everytime a new “integration point” is introduced
  • 26. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Automatic test Static Analysis with FindSecurityBugs Integrated with IDE Run by the developer while writing code Very reliable for SQL Injections and dangerous API calls Can annotate and disable false positives
  • 27. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Automatic test - Owasp ZAP Proxy Intercepts and analyzes all requests to the application, then: ● spidering (with context) ● passive scan ● active attack ● ….and more
  • 28. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Automatic test with ZAP Use of ZAP to check http security headers (X-XSS protection, X-Frame-options, Content-Security-Policy, etc.)
  • 29. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Automatic test with ZAP Use of ZAP to check http cookie parameters (flag http-only, flag secure, scope, lifetime)
  • 30. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Automatic test SSL settings active test Open Source: https://github.com/rbsec/sslscan & ZAP plugins
  • 31. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Semi-automatic test: components (execution is “simple”, results needs review) owasp dependency check
  • 32. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Semi-automatic test Configuration and deployment check ● ● SCREENSHOT port scanning (nmap) vulnerability scanning OpenVAS, Nessus (Commercial)
  • 33. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Security Tests vs Continuous Integration and Continuous Delivery DEV IDE C.I / C.D. Server Test EnvSCM Repo Artifact Repo PRE-PROD Env PROD Env Internet OSS Repo
  • 34. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Integration - Static Analysis Jenkins running FindSecurityBugs at each build Effective for ● avoiding dangerous APIs ● detecting SQL injection Aim at constantly bring down count to zero
  • 35. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Integration - Comp. Security Jenkins running Dependency Check at each build C.I / C.D. Server Artifact Repo OSS Repo Even more sophisticated Dependency filtering and analysis in tools like Nexus Lifecycle (Commercial)
  • 36. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Continuous Integration - ZAP Jenkins running ZAP daily Jenkins Job vb Build WAR Deploy Start ZAP, Webapp Functional Tests Trigger ZAP attack Stop Server ZAP Publish Report ZAP Server (e.g. Tomcat) WebAppProxy Spider / Attack REST API xml / html
  • 37. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Phase Activity Who? Tools / Methods Type Analysis Define Requirements Dev, Analyst Security Architect Owasp ASVS Thread Model, Risk review Manual Design Architecture - High Level Design Review Security Architect and/or Expert Diagrams, Documents, Secure Coding Principles Manual Implementation Write Code Developers Secure Coding Principles Manual Implementation Vuln. Assessment & Pen Test Security Expert ZAP, Nmap, Nessus (commercial), many others Manual Semi- AutoAutom atic Implementation Add other features Developers Static Code Analysis in IDE FindSecBugs, ZAP, DepCheck Mostly Automatic Test Vulnerability Assessment & Pen Test Security Expert ZAP, Nmap, Nessus (commercial), many others Manual Semi- autoAutom atic Production Monitoring Sysadmin/DevOps Log Application-Level Security Events Semi-auto
  • 38. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Remember three things 1. Fail Fast …. validate security & perform tests as early as possible 2. Automate where you can … you’ll earn more time to focus on tougher security issues 3. don’t skip periodic expert Design Review
  • 39. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco References Owasp Secure Coding Principles ● https://www.owasp.org/index.php/Secure_Coding_Principles OWASP Testing Guide ● https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents OWASP Application Security Verification Standard https://www.owasp.org/index.php/Category: OWASP_Application_Security_Verification_Standard_Project
  • 40. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco The Tools - Open Source ZAP ● https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Jenkins ● https://jenkins-ci.org/ Plugins ● https://wiki.jenkins-ci.org/display/JENKINS/OWASP+Dependency-Check+Plugin ● https://wiki.jenkins-ci.org/display/JENKINS/Static+Code+Analysis+Plug-ins ● https://wiki.jenkins-ci.org/display/JENKINS/ZAProxy+Plugin Find Security Bugs ● http://h3xstream.github.io/find-sec-bugs/ Dependency Check ● https://www.owasp.org/index.php/OWASP_Dependency_Check
  • 41. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco The Tools - Commercial Coverity ● http://www.coverity.com/ Nessus ● http://www.tenable.com/products/nessus-vulnerability-scanner Sonatype Nexus Lifecycle ● http://www.sonatype.com/nexus/product-overview/nexus-lifecycle
  • 42. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco Leave your feedback on Joind.in! https://m.joind.in/event/codemotion-milan-2015 Interested? ● attend our Web Application Security / Continuous Delivery trainings ● engage us for Design/Code Reviews, Vulnerability Assessments & team mentoring ● Read more on ○ http://www.nispro.it ○ http://www.slideshare.net/carlo.bonamico ● Follow us on twitter ○ @nis_srl @carlobonamico @gabrieleguasco ○ updates on Security, AngularJS, Continuous Delivery Questions? carlo.bonamico@nispro.it - gabriele.guasco@nispro.it
  • 43. MILAN 20/21.11.2015 - Carlo Bonamico & Gabriele Guasco lines of code security bugs vulnerability assessment Security sandwich approach bug growing rate