SlideShare a Scribd company logo
1 of 33
Download to read offline
for Cloud Native Stacks
19 July, 2022
Minimum Viable
Security
David Melamed, Co-Founder & CTO at Jit
2022
Source: https://visual.ly/community/Infographics/entertainment/protecting-your-house-home-alone-style
Public resources
IPs, buckets, …
3rd parties
User access
YOUR APP
CI/CD Pipeline
Protecting your perimeter
Admin User
Cloud Misconfig.
Pentesting
MFA / Scope
MFA / Least
privilege
YOUR APP
Least privilege
Controls to protect your perimeter
Admin User
YOUR APP
Protecting your app and its data
Disaster
recovery
Incident
Investigation
Access to
services
Traffic
Libraries
Secrets
YOUR APP
Controls to protect your app
Backup
Logging
Least Privilege
Encryption
Depcheck
SecretMgr
Minimum Security Controls
Securing a sample microservice
● Simple FastAPI-based app to display movies information
● Data persistence: SQLite
● SCM: Github / CI: Github Actions
● Goal: integrate the 7 tools that are part of the MVS in the CI pipeline
● Demo repository
https://github.com/dvdmelamed/stackconf-2022
Example for a Python-based app
Code vulnerabilities
➔ Ensure you don’t have vulnerabilities in your code
➔ Use a Static Application Security Testing (SAST) scanner to
detect vulnerabilities based on existing patterns
➔ Demo: Bandit
◆ Security open-source linter for Python source code
◆ Includes 35 rules for detecting vulnerabilities
Your Code
Secrets
➔ Make sure there are no hard-coded secrets
➔ Use a scanner that both searches for regexes of well known
secret patterns like PAT, Slack token, AWS keys…
➔ Demo: Gitleaks
◆ Supports multiple types of secrets: API keys, AWS credentials, SSH keys…
◆ Supports detecting secrets in git history
Your Code
Vulnerable Dependencies
➔ Track 3rd parties libraries with disclosed vulnerabilities (CPE / CVE)
➔ Use a scanner that will track down those vulnerable libraries
➔ Demo: dependency-check
◆ OWASP OSS project
◆ Detects publicly disclosed vulnerabilities contained within a project’s
dependencies
Your Code
Infrastructure misconfiguration
➔ When the infrastructure is expressed as code, it is possible to
detect misconfigurations early by scanning the code
➔ Use a scanner that will look for IaC misconfigurations
➔ Demo: KICS
◆ OSS by Checkmarx supporting many infrastructure types: CloudFormation,
Terraform, Ansible, Kubernetes, Helm, Docker, Ansible, ARM…
◆ Include 2000+ checks
Your Infrastructure
Pentesting
➔ Simulate attacks on your frontend to ensure it is safe
➔ Use a pentest / Web Application Scanner
➔ to test the security of your SaaS
➔ Demo: ZED Attack Proxy (ZAP)
◆ Free web app scanner by OWASP
◆ Includes 17 built-in rules
◆ Supports also API Scanning using OpenAPI
or Swagger for endpoint discovery
Your Runtime
Vulnerable container images
➔ When building your container images, make sure there is no
vulnerability in the base image
➔ Use a scanner that will scan your container images and enforce
your image trust (Notary)
➔ Demo: Trivy
◆ OSS by Aqua supporting OS packages and language-based packages
◆ Supports also IaC misconfigurations
Your Pipeline
Multi-Factor Authentication (MFA)
➔ Ensure you enforce MFA for all 3rd party access
➔ Make sure MFA is used (custom tool)
➔ Demo: MFA on Github
Your 3rd Parties
Securing a sample microservice: the tools
Bandit Gitleaks OWASP
Dependency-check
OWASP
ZAP
SAST SAST (Secrets) SCA DAST MFA
Custom
IAC
KICS Trivy
Containers
Example for a Python-based app
A Minimum Viable Security plan (1)
Code vulnerability
Secrets
Logging
Vulnerable libraries
01
04
Vulnerable containers
Least priv. access
02
Cloud Misconfiguration
Least Priv. Remote access
Your code Your infra
Your pipeline
03
Pentesting
API Security
Your runtime
A Minimum Viable Security plan (2)
05
Data encryption
Secrets storage
06
Multi-Factor Auth
Secured access
08
Audit
Backup
Your data Your 3rd parties
Your operations
07
Password manager
Your people
Improving dev-first experience: Jit
Dev-native experience
using PR comments
Customized MVS plan
Your next step on the security journey
Thank you
Intrigued? Try our free beta at jit.io
Inspired? Join us! We are hiring!
Questions? Contact me at david@jit.io

More Related Content

Similar to stackconf 2022: Minimum Viable Security for Cloud Native Stacks

Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
Developer Nirvana with IBM Bluemix™
Developer Nirvana with IBM Bluemix™Developer Nirvana with IBM Bluemix™
Developer Nirvana with IBM Bluemix™IBM
 
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16AppDynamics
 
Dev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - TorontoDev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - TorontoAmazon Web Services
 
DevOps On AWS - Deep Dive on Continuous Delivery
DevOps On AWS - Deep Dive on Continuous DeliveryDevOps On AWS - Deep Dive on Continuous Delivery
DevOps On AWS - Deep Dive on Continuous DeliveryMikhail Prudnikov
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 
Shifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istioShifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istioChristian Melendez
 
Stups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSStups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSJan Löffler
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudVelocidex Enterprises
 
Kube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor appsKube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor appsShikha Srivastava
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...sparkfabrik
 
What's New in Docker - February 2017
What's New in Docker - February 2017What's New in Docker - February 2017
What's New in Docker - February 2017Patrick Chanezon
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointIvanti
 
Embacing service-level-objectives of your microservices in your Cl/CD
Embacing service-level-objectives of your microservices in your Cl/CDEmbacing service-level-objectives of your microservices in your Cl/CD
Embacing service-level-objectives of your microservices in your Cl/CDNebulaworks
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesVMware Tanzu
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Matt Raible
 
Security and Advanced Automation in the Enterprise
Security and Advanced Automation in the EnterpriseSecurity and Advanced Automation in the Enterprise
Security and Advanced Automation in the EnterpriseAmazon Web Services
 
Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)Canturk Isci
 
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDSoftware Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDOWASP Delhi
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 

Similar to stackconf 2022: Minimum Viable Security for Cloud Native Stacks (20)

Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Developer Nirvana with IBM Bluemix™
Developer Nirvana with IBM Bluemix™Developer Nirvana with IBM Bluemix™
Developer Nirvana with IBM Bluemix™
 
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
Getting More Out of the Node.js, PHP, and Python Agents - AppSphere16
 
Dev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - TorontoDev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - Toronto
 
DevOps On AWS - Deep Dive on Continuous Delivery
DevOps On AWS - Deep Dive on Continuous DeliveryDevOps On AWS - Deep Dive on Continuous Delivery
DevOps On AWS - Deep Dive on Continuous Delivery
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
Shifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istioShifting security to the left with kubernetes, azure, and istio
Shifting security to the left with kubernetes, azure, and istio
 
Stups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSStups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWS
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Kube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor appsKube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor apps
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
 
What's New in Docker - February 2017
What's New in Docker - February 2017What's New in Docker - February 2017
What's New in Docker - February 2017
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Embacing service-level-objectives of your microservices in your Cl/CD
Embacing service-level-objectives of your microservices in your Cl/CDEmbacing service-level-objectives of your microservices in your Cl/CD
Embacing service-level-objectives of your microservices in your Cl/CD
 
Security Patterns for Microservice Architectures
Security Patterns for Microservice ArchitecturesSecurity Patterns for Microservice Architectures
Security Patterns for Microservice Architectures
 
Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020Security Patterns for Microservice Architectures - SpringOne 2020
Security Patterns for Microservice Architectures - SpringOne 2020
 
Security and Advanced Automation in the Enterprise
Security and Advanced Automation in the EnterpriseSecurity and Advanced Automation in the Enterprise
Security and Advanced Automation in the Enterprise
 
Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)Vulnerability Advisor Deep Dive (Dec 2016)
Vulnerability Advisor Deep Dive (Dec 2016)
 
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDSoftware Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

stackconf 2022: Minimum Viable Security for Cloud Native Stacks

  • 1. for Cloud Native Stacks 19 July, 2022 Minimum Viable Security David Melamed, Co-Founder & CTO at Jit 2022
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8. Public resources IPs, buckets, … 3rd parties User access YOUR APP CI/CD Pipeline Protecting your perimeter Admin User
  • 9. Cloud Misconfig. Pentesting MFA / Scope MFA / Least privilege YOUR APP Least privilege Controls to protect your perimeter Admin User
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. YOUR APP Protecting your app and its data Disaster recovery Incident Investigation Access to services Traffic Libraries Secrets
  • 15. YOUR APP Controls to protect your app Backup Logging Least Privilege Encryption Depcheck SecretMgr
  • 16.
  • 17.
  • 18.
  • 20. Securing a sample microservice ● Simple FastAPI-based app to display movies information ● Data persistence: SQLite ● SCM: Github / CI: Github Actions ● Goal: integrate the 7 tools that are part of the MVS in the CI pipeline ● Demo repository https://github.com/dvdmelamed/stackconf-2022 Example for a Python-based app
  • 21. Code vulnerabilities ➔ Ensure you don’t have vulnerabilities in your code ➔ Use a Static Application Security Testing (SAST) scanner to detect vulnerabilities based on existing patterns ➔ Demo: Bandit ◆ Security open-source linter for Python source code ◆ Includes 35 rules for detecting vulnerabilities Your Code
  • 22. Secrets ➔ Make sure there are no hard-coded secrets ➔ Use a scanner that both searches for regexes of well known secret patterns like PAT, Slack token, AWS keys… ➔ Demo: Gitleaks ◆ Supports multiple types of secrets: API keys, AWS credentials, SSH keys… ◆ Supports detecting secrets in git history Your Code
  • 23. Vulnerable Dependencies ➔ Track 3rd parties libraries with disclosed vulnerabilities (CPE / CVE) ➔ Use a scanner that will track down those vulnerable libraries ➔ Demo: dependency-check ◆ OWASP OSS project ◆ Detects publicly disclosed vulnerabilities contained within a project’s dependencies Your Code
  • 24. Infrastructure misconfiguration ➔ When the infrastructure is expressed as code, it is possible to detect misconfigurations early by scanning the code ➔ Use a scanner that will look for IaC misconfigurations ➔ Demo: KICS ◆ OSS by Checkmarx supporting many infrastructure types: CloudFormation, Terraform, Ansible, Kubernetes, Helm, Docker, Ansible, ARM… ◆ Include 2000+ checks Your Infrastructure
  • 25. Pentesting ➔ Simulate attacks on your frontend to ensure it is safe ➔ Use a pentest / Web Application Scanner ➔ to test the security of your SaaS ➔ Demo: ZED Attack Proxy (ZAP) ◆ Free web app scanner by OWASP ◆ Includes 17 built-in rules ◆ Supports also API Scanning using OpenAPI or Swagger for endpoint discovery Your Runtime
  • 26. Vulnerable container images ➔ When building your container images, make sure there is no vulnerability in the base image ➔ Use a scanner that will scan your container images and enforce your image trust (Notary) ➔ Demo: Trivy ◆ OSS by Aqua supporting OS packages and language-based packages ◆ Supports also IaC misconfigurations Your Pipeline
  • 27. Multi-Factor Authentication (MFA) ➔ Ensure you enforce MFA for all 3rd party access ➔ Make sure MFA is used (custom tool) ➔ Demo: MFA on Github Your 3rd Parties
  • 28. Securing a sample microservice: the tools Bandit Gitleaks OWASP Dependency-check OWASP ZAP SAST SAST (Secrets) SCA DAST MFA Custom IAC KICS Trivy Containers Example for a Python-based app
  • 29. A Minimum Viable Security plan (1) Code vulnerability Secrets Logging Vulnerable libraries 01 04 Vulnerable containers Least priv. access 02 Cloud Misconfiguration Least Priv. Remote access Your code Your infra Your pipeline 03 Pentesting API Security Your runtime
  • 30. A Minimum Viable Security plan (2) 05 Data encryption Secrets storage 06 Multi-Factor Auth Secured access 08 Audit Backup Your data Your 3rd parties Your operations 07 Password manager Your people
  • 31. Improving dev-first experience: Jit Dev-native experience using PR comments Customized MVS plan
  • 32. Your next step on the security journey
  • 33. Thank you Intrigued? Try our free beta at jit.io Inspired? Join us! We are hiring! Questions? Contact me at david@jit.io