SlideShare a Scribd company logo
1 of 30
Download to read offline
Security in a Continuous
Delivery World
Sherif Mansour
“Give me six hours to chop down a tree and I will spend
the first four sharpening the axe.”
-Abraham Lincoln
Two things about Automation
1. Automation applied to an efficient operation will
magnify its efficiency
2. Automation applied to an inefficient operation will
magnify its inefficiency
-Bill Gates
Two things about Web Programming
1. Control-C
2. Control-V
Two Things About World Conquest
1. Divide and Conquer.

2. Never invade Russia in the winter.
Two Things About Information Security
Complete:
1.
2.
Overview
• Timeline - 1986
• Agile Security
• Bug Tracker
• Definition of Done
• App Sec Radar
• Continuous Delivery
• Security Testing
• How OWASP can help
Timeline - 1986
• HBR publishes an article: “The New New
Product Development Game”
• Computer Fraud and Abuse Act
The New New Product Development
Game
Leading companies show six characteristics in managing their new product
development processes:
1. Built-in instability
2. Self-organizing project teams
3. Overlapping development phases
4. “Multilearning”
5. Subtle control
6. Organizational transfer of learning
Agile Frameworks
• XP
• Scrum
• Crystal
• FDD
• Lean and Kanban
• DSDM
Computer Fraud and Abuse Act
• Enacted in 1986
• First Felony in 1988 - Morris Worm
• Mr. Robert Morris Sr. (his father) was the
Chief Scientist at NSA
• Comm-Sec & Compu-Sec merged Info-
Sec
• CERT was created in CMU
Since Then Its Been An Arms Race
Stop me of you have seen this before
Applying controls without understanding its limitations.
Fast Forward to 2001
1.OWASP was formed :-)
2.Agile Manifesto was published :-) :-)
OWASP
• OWASP Top Ten
• OWASP Software Assurance Maturity Model
• OWASP Development Guide
• OWASP ZAP Project: The Zed Attack Proxy
(ZAP)
Agile Manifesto
• Individuals and Interactions over
processes and tools
• Working software over comprehensive
documentation
• Customer collaboration over contract
negotiation
• Responding to change over following a
plan
Agile Principles
Agile (scrum) Framework
Security in an Agile Framework
• Communicate Security
Recommendations simply and clearly
• Identify the biggest risk and which ones
you teams are exposed to
• When you raise a security issue:
• Unique - No duplicates
• Useful - Improves the security and
quality of the software
• Actionable - All necessary
information is in the ticket
App Sec Issues Tracking and Metrics
For every security issue detected raise
a Jira bug ticket and include the
following attributes to the bug type:
1. Business risk
2. Attack vector
3. Priority
4. Components
5. Testing Method
6. Dev Team
Metrics
App-Sec Radar
The Application Security Radar is a
site in forms the technology teams
on security technologies they should
embrace or move away from.
This ensures developers adopt
more secure technologies, there are
6 recommendation categories for
the app sec radar:
• Plan for Removal
• No New Use
• Evaluate
• Trial
• Adopt
• Hold
DoD - Definition of Done
• Security should include a reference quick
check list for developers on what to
avoid, and what to look out for during
code review.
Continuous Delivery
You’re doing continuous delivery when:
• Your software is deployable throughout its lifecycle
• Your team prioritises keeping the software deployable
over working on new features
• Anybody can get fast, automated feedback on the
production readiness of their systems any time
somebody makes a change to them
• You can perform push-button deployments of any
version of the software to any environment on demand
Release Vehicle vs. Pipeline
Testing in Continuous Delivery
How OWASP Can Help
• If you solve a problem and I solve a
problem, each of us has two solutions.
• Guidance
• Security Libraries
• Developer tools
• Training
• etc..
Thank you
Two More things :-)
Interests
• Headers reporting back:
• Content Security Policy CSP
• HTTP Public Key Pinning
• DMARC - (Email Standard)
Please Welcome Simon Bennetts

More Related Content

What's hot

OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavOWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
Abhay Bhargav
 
BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat Security Conference
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
Kevin Fealey
 

What's hot (20)

Using jira to manage risks v1.0 - owasp app sec eu - june 2016
Using jira to manage risks   v1.0 - owasp app sec eu - june 2016Using jira to manage risks   v1.0 - owasp app sec eu - june 2016
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
Engineering Trust in Your Automated Tests
Engineering Trust in Your Automated TestsEngineering Trust in Your Automated Tests
Engineering Trust in Your Automated Tests
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6SecDevOps Risk Workflow - v0.6
SecDevOps Risk Workflow - v0.6
 
A Secure DevOps Journey
A Secure DevOps JourneyA Secure DevOps Journey
A Secure DevOps Journey
 
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavOWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)
 
BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...BlueHat v18 || Improving security posture through increased agility with meas...
BlueHat v18 || Improving security posture through increased agility with meas...
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
 
Legacy-SecDevOps (AppSec Management Debrief)
Legacy-SecDevOps (AppSec Management Debrief)Legacy-SecDevOps (AppSec Management Debrief)
Legacy-SecDevOps (AppSec Management Debrief)
 
App sec and quality london - may 2016 - v0.5
App sec and quality   london -  may 2016 - v0.5App sec and quality   london -  may 2016 - v0.5
App sec and quality london - may 2016 - v0.5
 
Effective DevSecOps
Effective DevSecOpsEffective DevSecOps
Effective DevSecOps
 
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
Chef Automating Everything-AWS-PubSec-SAO-WashDC_2018
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 

Similar to Security in a Continuous Delivery World - 2015 - Sherif Mansour

4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
gealehegn
 
2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
Michael Coates
 
Lecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.pptLecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.ppt
DrBasemMohamedElomda
 

Similar to Security in a Continuous Delivery World - 2015 - Sherif Mansour (20)

Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
 
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?PCI and Vulnerability Assessments - What’s Missing?
PCI and Vulnerability Assessments - What’s Missing?
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
2013 michael coates-javaone
2013 michael coates-javaone2013 michael coates-javaone
2013 michael coates-javaone
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Best Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and SecurityBest Practices for Ensuring SAP ABAP Code Quality and Security
Best Practices for Ensuring SAP ABAP Code Quality and Security
 
Lecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.pptLecture Course Outline and Secure SDLC.ppt
Lecture Course Outline and Secure SDLC.ppt
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
Understanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and ChallengesUnderstanding Technology Stakeholders: Their Progress and Challenges
Understanding Technology Stakeholders: Their Progress and Challenges
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Security in a Continuous Delivery World - 2015 - Sherif Mansour

  • 1. Security in a Continuous Delivery World Sherif Mansour
  • 2. “Give me six hours to chop down a tree and I will spend the first four sharpening the axe.” -Abraham Lincoln
  • 3. Two things about Automation 1. Automation applied to an efficient operation will magnify its efficiency 2. Automation applied to an inefficient operation will magnify its inefficiency -Bill Gates
  • 4. Two things about Web Programming 1. Control-C 2. Control-V
  • 5. Two Things About World Conquest 1. Divide and Conquer.
 2. Never invade Russia in the winter.
  • 6. Two Things About Information Security Complete: 1. 2.
  • 7. Overview • Timeline - 1986 • Agile Security • Bug Tracker • Definition of Done • App Sec Radar • Continuous Delivery • Security Testing • How OWASP can help
  • 8. Timeline - 1986 • HBR publishes an article: “The New New Product Development Game” • Computer Fraud and Abuse Act
  • 9. The New New Product Development Game Leading companies show six characteristics in managing their new product development processes: 1. Built-in instability 2. Self-organizing project teams 3. Overlapping development phases 4. “Multilearning” 5. Subtle control 6. Organizational transfer of learning
  • 10. Agile Frameworks • XP • Scrum • Crystal • FDD • Lean and Kanban • DSDM
  • 11. Computer Fraud and Abuse Act • Enacted in 1986 • First Felony in 1988 - Morris Worm • Mr. Robert Morris Sr. (his father) was the Chief Scientist at NSA • Comm-Sec & Compu-Sec merged Info- Sec • CERT was created in CMU
  • 12. Since Then Its Been An Arms Race
  • 13. Stop me of you have seen this before Applying controls without understanding its limitations.
  • 14. Fast Forward to 2001 1.OWASP was formed :-) 2.Agile Manifesto was published :-) :-)
  • 15. OWASP • OWASP Top Ten • OWASP Software Assurance Maturity Model • OWASP Development Guide • OWASP ZAP Project: The Zed Attack Proxy (ZAP)
  • 16. Agile Manifesto • Individuals and Interactions over processes and tools • Working software over comprehensive documentation • Customer collaboration over contract negotiation • Responding to change over following a plan
  • 19. Security in an Agile Framework • Communicate Security Recommendations simply and clearly • Identify the biggest risk and which ones you teams are exposed to • When you raise a security issue: • Unique - No duplicates • Useful - Improves the security and quality of the software • Actionable - All necessary information is in the ticket
  • 20. App Sec Issues Tracking and Metrics For every security issue detected raise a Jira bug ticket and include the following attributes to the bug type: 1. Business risk 2. Attack vector 3. Priority 4. Components 5. Testing Method 6. Dev Team
  • 22. App-Sec Radar The Application Security Radar is a site in forms the technology teams on security technologies they should embrace or move away from. This ensures developers adopt more secure technologies, there are 6 recommendation categories for the app sec radar: • Plan for Removal • No New Use • Evaluate • Trial • Adopt • Hold
  • 23. DoD - Definition of Done • Security should include a reference quick check list for developers on what to avoid, and what to look out for during code review.
  • 24. Continuous Delivery You’re doing continuous delivery when: • Your software is deployable throughout its lifecycle • Your team prioritises keeping the software deployable over working on new features • Anybody can get fast, automated feedback on the production readiness of their systems any time somebody makes a change to them • You can perform push-button deployments of any version of the software to any environment on demand
  • 27. How OWASP Can Help • If you solve a problem and I solve a problem, each of us has two solutions. • Guidance • Security Libraries • Developer tools • Training • etc..
  • 28. Thank you Two More things :-)
  • 29. Interests • Headers reporting back: • Content Security Policy CSP • HTTP Public Key Pinning • DMARC - (Email Standard)