Software Security: In the World of Cloud & CI-CD

Security Researcher at Adobe, Chapter Leader at OWASP & null
Dec. 5, 2015
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
1 of 23

More Related Content

Slideshows for you

Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
Azure tales: a real world CQRS and ES Deep Dive - Andrea SaltarelloAzure tales: a real world CQRS and ES Deep Dive - Andrea Saltarello
Azure tales: a real world CQRS and ES Deep Dive - Andrea SaltarelloITCamp
Software Architecture: A Story About Business Value and TradeoffsSoftware Architecture: A Story About Business Value and Tradeoffs
Software Architecture: A Story About Business Value and TradeoffsVMware Tanzu
Yannis Zarkadas. Enterprise data science workflows on kubeflowYannis Zarkadas. Enterprise data science workflows on kubeflow
Yannis Zarkadas. Enterprise data science workflows on kubeflowMarynaHoldaieva
DevSecOps : The Open Source Way by Yusuf HadiwinataDevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf HadiwinataHananto Wibowo Soenarto
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Denim Group

Slideshows for you(20)

Viewers also liked

Lifestyle holidays vacation clubLifestyle holidays vacation club
Lifestyle holidays vacation clubLifestyle Holidays Vacation Club
謎コンテンツ制作者向けアンケート第1段:集計結果謎コンテンツ制作者向けアンケート第1段:集計結果
謎コンテンツ制作者向けアンケート第1段:集計結果Uran Bird
досвід людської особидосвід людської особи
досвід людської особиbiblioteka_c
Beautiful BathroomsBeautiful Bathrooms
Beautiful Bathroomsfountaindirect
OrkneynewstodayOrkneynewstoday
OrkneynewstodayJack740
Vado bathroom acessoriesVado bathroom acessories
Vado bathroom acessoriesfountaindirect

Similar to Software Security: In the World of Cloud & CI-CD

Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline SecurityJames Wickett
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointIvanti
CICD Pipeline - AWS AzureCICD Pipeline - AWS Azure
CICD Pipeline - AWS AzureRatan Das
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
Cloud continuous integration- A distributed approach using distinct servicesCloud continuous integration- A distributed approach using distinct services
Cloud continuous integration- A distributed approach using distinct servicesAndré Agostinho
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar NikaleAgile Testing Alliance

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

GDSC_Info_Session_KITTiptur.pptxGDSC_Info_Session_KITTiptur.pptx
GDSC_Info_Session_KITTiptur.pptxRadhikaNA
Carrom Pool Mod APK.docxCarrom Pool Mod APK.docx
Carrom Pool Mod APK.docxRayJ12
Generative AI PotentialGenerative AI Potential
Generative AI PotentialKapil Khandelwal (KK)
What’s new in Kotlin 12-08-2023 Google IO Cairo 23What’s new in Kotlin 12-08-2023 Google IO Cairo 23
What’s new in Kotlin 12-08-2023 Google IO Cairo 23Ahmed Nabil
Common - Concerns Around OpenAI.pptxCommon - Concerns Around OpenAI.pptx
Common - Concerns Around OpenAI.pptxAlok Ranjan
GDSC23 SAC - Info Session GDSC.pptxGDSC23 SAC - Info Session GDSC.pptx
GDSC23 SAC - Info Session GDSC.pptxSAC

Software Security: In the World of Cloud & CI-CD

  1. 26 Nov 2015 Venue: Akamai, Singapore OWASP Singapore. 28 Nov 2015 Venue: Airtel, Delhi-India. OWASP, Delhi-India. Remote WebEx From Singapore. Software Security: “In The World Of, Cloud & CI-CD” -Aniket Kulkarni Software Security Architect (BigdataCloudMobileWeb)

  2. Agenda  Cloud & It’s Snapshots  Definition Of Todays Client’s  Users Angle To cloud  Changing Landscape Of Customer Requirements  CI, CD  An Era Of Dashboards  Secure SDLC: CI-CD Way

  3. Cloud Computing? Cloud computing: Also known as on-demand computing, is a kind of internet-based computing, where shared resources and information are provided to computers and other devices on-demand.

  4. Cloud Snapshots

  5. Client’s Today ? CLOUD

  6. Continuous Integration-CI.  Continuous Integration (CI) is a development practice that requires developers to integrate code into a shared repository several times a day.  Each check-in is then verified by an automated build, allowing teams to detect problems early.

  7. Continuous Delivery-CD.  Continuous Delivery (CD): is a software engineering approach in which teams keep producing valuable software in short cycles and ensure that the software can be reliably released at any time.  It aims at, building, testing, and releasing software, faster and more frequently.

  8. Continuous Deployment-CD.  Continuous Deployment (CD): Is next phase to continuous delivery.  Every change that passes the automated tests get deployed on production automatically.

  9. Users Angle To Cloud. Client Side Subscribed USER1 Free USER3 Subscribed USER2 Application Server Storage ServiceI & AM Notification Service

  10. An Era Of Dashboards.

  11. Changing Landscape Of Requirements  On Going Customer Demands  Associated Market Competitions  Product Research Outcomes “Constant Rotating Eyeball On Product In Production, Hosted On Cloud, with constant changes”

  12. Challenges For Business Stakeholders  How to manage security posture of 150+ cloud products ?  Shall we invest for Security (Yes/NO) ?  If yes, how much ? Confused for decision ?  Invested $X million. How much secure we are ?  We are 100% Compliance done! Are We Secure now?  Are we satisfying customer demands ?

  13. S-SDLC (CI-CD): Component Repository External Repositories Internal ComponentsOrganization Repository (Ex:NexusArtifactory)

  14. S-SDLC (CI-CD): 3rd Party External Component Security External Repositories Internal Components Organization Repository (Ex: Nexus Artifactory) 3rd Party Component Security Tools (Ex: Sonatype CLM) Continuous Dashboard Update

  15. S-SDLC (CI-CD): Development External Repositories Internal Components Organization Repository (Ex: Nexus Artifactory) Static Source Code Analysis Tool (Ex: Fortify) Continuous Dashboard Update

  16. S-SDLC (CI-CD): QA • Internal Automation Frameworks • Mostly Python Scripts Actual Web Product Hosted On Staging Dynamic Analysis Tool Run Manual Dashboard Update InternalExternal Penetration Tests Continuous Dashboard Update Interactive Application Security Testing (Ex: Contrast)

  17. S-SDLC (CI-CD): SASTDASTIAST SAST DAST IAST • Uses source code to find vulnerabilities without running the application. • Misses run time vulnerabilities. • Many false positives • Analyzes application in its running state by fuzzing with malicious payloads from outside • Misses business logic vulnerabilities • Many false positives • Analyzes application in its running state by deploying sensors inside the app. • Finds most of the things which SAST and DAST misses • Almost NoLess false positives

  18. S-SDLC (CI-CD): Typical IAST Deployment Custom Code Java Runtime Application Server Frameworks Libraries IAST Engine Security Information To Dashboard Web Application Data From Passive Sensors

  19. S-SDLC (CI-CD): Compact View DEVELOPMENTCOMPONENT SELECTION QA IASTSTAGING All Set For Product Release ? 

  20. Rethinking challenges! How we appear on challenges now ?  How to manage security posture of 150+ cloud products?  Shall we invest for Security (Yes/NO) ?  If yes, how much ? Confused for decision ?  Invested $X million. How much secure we are ?  We are 100% Compliance done! Are We Secure now?  Are we satisfying customer demands ?

  21. Key Points Take Away  Cloud & CI,CD  Software product Business challenges  Pitching security in fast pace environment: -3rd party component security -Security at Development -Security at QA -Security at StagingProduction  Solutions that we have for this fast pace environment  Security an input for business decisions  Deciding factor for security investment & ROI

  22. Q & A

  23. Thank you, Aniket Kulkarni - Software Security Architect (BigdataCloudMobileWeb) Autodesk Singapore Research & Development Center Singapore.