SlideShare a Scribd company logo
1 of 25
NEELU
TRIPATHY
NEELU TRIPATHY
CONTINUOUS SECURITY: BEYOND AUTOMATION
Continuous Security: Beyond Automation
NEELU
TRIPATHY
Work
Conferences
Contact
Interests & Certifications
§ Security Practice Lead, Thoughtworks India
§ 13+ years of InfoSec experience
§ Establishing Security practices for client
facing product development
§ Speaker/Trainer: c0c0n, BlackHat, BSidesDelhi,
NSRCEL IIMB; Villages at Nullcon, DefCon, rootconf
§ Organizer: SecConf, Thoughtworks
§ Review Board: NullCon, bSides SGP, CySEK Karnataka
§ DevSecOps, Continuous Security, Vulnerability
Assessments, Pentesting for Web & Networks, Red
Teaming, Social Engineering, Threat Modelling &
Design Reviews
§ OSCP, GraphQLParser for Burp
@neelutripathy
br3akp0int@Null/Git
neelutripathy
ABOUT ME
NEELU
TRIPATHY
§ Affected: 23000
users/customers
§ Leaked Credentials in
Docker image
§ Bash uploader Script
modified
§ Created a backdoor from
customer Cis
§ Stole Git creds, tokens,
keys
§ Malware: APT29
§ Affected: FireEye, US
Treasury
§
§ Target: NMS Orion;
300000 Customers(US
Fed, DoD, 425/Fortune
500)
§ Build Server compromised
§ Wasn’t present in code
§ March – June – 2020
§ Handcrafted: sleep b4
execute, custom to
environments, avoid
private IPs
§ 57 million customer and
driver records stolen
§ $100,000 for cover-up
§ $148 million total cost to
Uber
§ AWS credentials in Github
§ Github repo was exposed
§ CSO Joe Sullivan forced to
leave
LAST FEW YEARS..
NEELU
TRIPATHY
MAINTENANCE
RELEASE
DEPLYMENT
TEST
DEVELOPMENT
DESIGN
REQUIREMENTS
REQUIREMENTS
DESIGN
DEVELOPMENT
TEST
DEPL0Y
REVIEW
RELEASE
WATERFALL AGILE
AGILE & WATERFALL DEVELOPMENT
NEELU
TRIPATHY
CONTINUOUS SECURITY
VULNERABILITIES
PREDICTABLE
Automation
TOOLS PRODUCTS
NOT PREDICTABLE
PEOPLE
PROCESSES
CONTINUOUS SECURITY: LIMITATIONS OF AUTOMATION
NEELU
TRIPATHY
Detective
•SAST
•DAST
•Dependency
Checking
•IDE Static Analysis
•RASP/IAST
Preventive
•Secrets Check-in
prevention
•pre-commit/push
hooks
•Security Unit tests
•Compliance as Code
•Security in IaC
Environmental
•Container Security
•Version Controls
•Network/Host/cloud
•Hardening
•Dev Components
Configuration
•WAF
•Logging &
Monitoring
•DoS Protection
AUTOMATING
CONTROLS
NEELU
TRIPATHY
NEELU TRIPATHY
SECURITY OF THE PRODUCT VS PRODUCT
DELIVERY
NEELU
TRIPATHY
Security Practices
Standards
Supply Chain Security
Product Security
Awareness
SECURING YOUR PRODUCT DEVELOPMENT
NEELU
TRIPATHY
Product Security
SECURING YOUR PRODUCT DEVELOPMENT
NEELU
TRIPATHY
Product is secure(enough)
Fewer vulnerabilities in the product
Code is written securely
Cannot be abused to cause damage
NEELU
TRIPATHY
PRODUCT SECURITY: KASEYA
KASEYA
• Ransomware attack
• Kaseya's VSA software
• Affected: 50 direct customers,
and between 800 and 1,500
businesses down the chain
• Cause: authentication bypass
vulnerability in the Kaseya VSA
• Authentication Bypass >> SQL
injection >> code execution >>
management agent update with
REvil ransomware.
NEELU
TRIPATHY
Infrastructure
§ Threat Modeling
§ Architecture Review
Design
§ Vulnerability
assessment
§ Penetration testing
§ Mobile/Device
Testing
Dynamic
Application/Service
Static Code
§ Static Code
Security review
§ License
verification
§ Dependency
checking
§ Network VA/PT
(BB/GB)
§ Container
Scanning
§ Cloud Security
Assessment
MAKING A SECURE SOFTWARE
NEELU
TRIPATHY
Supply Chain Security
SECURING YOUR PRODUCT DEVELOPMENT
NEELU
TRIPATHY
Security of the DELIVERY
Source:sysdig.com
DEV
TEST
STAGING
PROD
SECURITY OF THE DELIVERY
NEELU
TRIPATHY
Source:sysdig.com
DEV
TEST
STAGING
PROD
ATTACK SURFACE
NEELU
TRIPATHY
Standards
Awareness
SECURING YOUR PRODUCT DEVELOPMENT
NEELU
TRIPATHY
Tech Stack
specific
Role
specific
awareness
General
Security
Awareness
AWARENESS
Developer
Business Analyst
QA
Tech Lead
Tech Architect
NEELU
TRIPATHY
Frameworks
& Standards
• NIST
Cybersecurity
Framework
• ISO 27001
• GDPR
• PCI
• and so on..
Password
Policy
Mobile/Device
security
Endpoint
Security
Network
security
Risk
Assessment &
Treatment
Physical
environment
Product
security
Communicatio
ns &
operations
Maintenance,
Patching
STANDARDS
NEELU
TRIPATHY
Security Practices
SECURING YOUR PRODUCT DEVELOPMENT
NEELU
TRIPATHY
20
§ Secure
Baselines as a
starting point
§ Hardening
§ Configuration
§ Security
Acceptance
Criteria
§ DevSecOps
KPIs,
SLAs/TATs
§ Observability &
Threat
Management
§ Backlog >
Project
Dashboard
§ Vulnerability
Management
§ Create
Feedback
Loops
§ Security Unit
Tests
§ Code Review
Checkpoints
§ Audit/Secure
Delivery
Checklists
§ ITMs
§ Access
Management
§ Change
Management
§ Sustainable
§ Evolving
Awareness
SECURITY
PRACTICES
NEELU
TRIPATHY
21
Educate Dev Teams Define and design Security backlog Planning
Team card
wall/board
1 2 3 4 5
Feedback/Security
Unit Tests
Infra Security Review Container Scanning DAST Develop
10 9 8 7 6
Security Epic
User Story-Sec
ACs
Epic
User Story
Epic
Fix Story TO DO DOING DONE
Analyze
SCA
SAST
Test and review
Network
Vulnerability
Assessment
Inspect
and adapt
Priority
Threat
Modelling
Technology & Automation
Process
People
Sec Champ
/Dev/QA/TL/BA
Sec Champ/Expert:
Optional
DevOps
Product Tech
Principle/Lead
Project Manager
Security Expert
Sec Champ
/Dev/QA/TL/BA
As the story goes
NEELU
TRIPATHY
1
2
3
4
5
Promote security as code
Secure by design
Automating security gates
Security is everyone’s responsibility
Security in the definition of done
Key Takeaways
NEELU
TRIPATHY
References
• https://news.sophos.com/en-us/2021/07/02/kaseya-vsa-supply-chain-
ransomware-attack/
• https://www.informationisbeautiful.net/visualizations/worlds-biggest-
data-breaches-hacks/
• https://owasp.org/www-project-devsecops-maturity-model/
• https://owasp.org/www-project-application-security-verification-
standard/
• https://martinfowler.com/articles/agile-threat-modelling.html
NEELU
TRIPATHY
Q & A
NEELU
TRIPATHY
THANK YOU!
Contact
@neelutripathy
br3akp0int@Null/Git
neelutripathy
Neelu Tripathy
Security Practice Lead, Thoughtworks India

More Related Content

What's hot

What's hot (20)

DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
DevSecOps and the CI/CD Pipeline
 DevSecOps and the CI/CD Pipeline DevSecOps and the CI/CD Pipeline
DevSecOps and the CI/CD Pipeline
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
DevOps Best Practices
DevOps Best PracticesDevOps Best Practices
DevOps Best Practices
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptx
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
 
DevSecOps on Azure
DevSecOps on AzureDevSecOps on Azure
DevSecOps on Azure
 
chaos-engineering-Knolx
chaos-engineering-Knolxchaos-engineering-Knolx
chaos-engineering-Knolx
 
Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Assessment methodology and approach
Assessment methodology and approachAssessment methodology and approach
Assessment methodology and approach
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
DevOps for beginners
DevOps for beginnersDevOps for beginners
DevOps for beginners
 
Security in CI/CD Pipelines: Tips for DevOps Engineers
Security in CI/CD Pipelines: Tips for DevOps EngineersSecurity in CI/CD Pipelines: Tips for DevOps Engineers
Security in CI/CD Pipelines: Tips for DevOps Engineers
 

Similar to ContinuousSecurity, Beyond Automation.pdf

ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
Netcetera
 
Alternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure WebAlternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure Web
CASCouncil
 

Similar to ContinuousSecurity, Beyond Automation.pdf (20)

You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise KubernetesDCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
 
AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019 AllDayDevOps Security Chaos Engineering 2019
AllDayDevOps Security Chaos Engineering 2019
 
Secure DevOps: A Puma's Tail
Secure DevOps: A Puma's TailSecure DevOps: A Puma's Tail
Secure DevOps: A Puma's Tail
 
Gaurav security profile_5_years_experience
Gaurav security profile_5_years_experienceGaurav security profile_5_years_experience
Gaurav security profile_5_years_experience
 
Security as Code: DOES15
Security as Code: DOES15Security as Code: DOES15
Security as Code: DOES15
 
Tech t18
Tech t18Tech t18
Tech t18
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
Alternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure WebAlternatives to Certificate Authorities for a Secure Web
Alternatives to Certificate Authorities for a Secure Web
 
Problems with parameters b sides-msp
Problems with parameters b sides-mspProblems with parameters b sides-msp
Problems with parameters b sides-msp
 
Vinoth babu b new
Vinoth babu b newVinoth babu b new
Vinoth babu b new
 
Vinoth Babu B-New
Vinoth Babu B-NewVinoth Babu B-New
Vinoth Babu B-New
 
Vinoth babu b new
Vinoth babu b newVinoth babu b new
Vinoth babu b new
 
SeattleFall1
SeattleFall1SeattleFall1
SeattleFall1
 
Ashwin Resume
Ashwin ResumeAshwin Resume
Ashwin Resume
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 

More from Neelu Tripathy

More from Neelu Tripathy (7)

Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0
 
Mobile Security Risks & Mitigations
Mobile Security Risks & MitigationsMobile Security Risks & Mitigations
Mobile Security Risks & Mitigations
 
Pentesting GraphQL Applications
Pentesting GraphQL ApplicationsPentesting GraphQL Applications
Pentesting GraphQL Applications
 
Burp Suite Extensions
Burp Suite ExtensionsBurp Suite Extensions
Burp Suite Extensions
 
PHP Mailer Remote Code Execution
PHP Mailer Remote Code ExecutionPHP Mailer Remote Code Execution
PHP Mailer Remote Code Execution
 
Understanding Burp Replicator
Understanding Burp ReplicatorUnderstanding Burp Replicator
Understanding Burp Replicator
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering Techniques
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

ContinuousSecurity, Beyond Automation.pdf