Hey, good afternoon everyone My name is Omer, and I’m really excited being here Today I’m going to talk about how we can secure the pipeline I want to start this talk by showing gratitude First, to all the people who worked hard on organizing this conf and all the people who are working today so we all could enjoy it - thank you Second, I want to thank the organizers who choose me to speak here, so thank you. It is a big honor Why do we need to Secure the Pipeline?
Especially when starting to work on a new platform – we don’t always have the time on security Security tools can help us with that
Embedding security into the pipeline can help us with that – by running security tests the pipeline can let us know that our code is secure This is why we need to secure the pipeline
I’m a builder, this is what I love doing and doing it from a really early age Doing it professionally for the last 8 years I’m from Israel, married etc Who else is a builder? This talk is for you!
Today I’m working at Soluto, our missing is to help people with their technology My job is DevSecOps, or as I see it - helping the entire team to build a more secure software I’m achieving it via many approaches, including education, reviewing and threat modeling – but what I love the most is threat modeling
Big part of my work is OWASP, I’m enthusiast and familiar to many project. I contributed code to projects, mainly Zap and Glue and I’m a paid memember and project leader of Glue. Glue is a tool that helps to integrate security tools into the CI/CD pipeline – I will not have time to dive into the tool, but come talk with me later about it – I have stickers
This is the questions we started with. It’s a really wide question, and it’s really hard to answer it Let’s use induction – take one specific use case, find the answer and try to generalize it
Let’s go quickly over the different tests. Due to time limits, this is only a taste of the tools – going quickly over them, understand the value and how they run – but not going into details. There is a blog post for this. Blog post blog post blog post
I talked a lot about tools – but where is the pipeline part? Due to time limit, I focused more on what tests and tools you should be using. The next step is pipeline integration – and all the tools could be integrated into the pipeline
These are the tools I showed during this talk, you can find all the information I discussed and more on this blog post. You can also play with the readme. All these are generics and can be used by multiple languages and frameworks.
If you got value from this session, I’ll highly appreciate your feedback – personally or via twitter
I talked a lot in this talk, and I showed you 5 different types of tests, and tools you can start using today. My part is over now – and now it’s your turn. Think about one tool, just one, from all the tools I’ve discussed and give it a try – use the repo or the blog post.
Secure the Pipeline - OWASP Poland Day 2018
Secure the Pipeline
Omer Levi Hevroni
W a r s a w , 1 0 . 1 0 . 2 0 1 8
Poland Day 2018
Wr i t i n g S e c u re C o d e i s H a rd
A l l i s G o o d
Yo u C a n P u b l i s h
Wra p p i n g U p
h t t p s : / / w p . m e / p a k m v i - 1 w
Test Type Tool Name
Static Analysis Microsoft DevSkim
Dynamy Analysis OWASP Zap
Packages OWASP Dependency
Docker Anchore Engine/Clair
Q u e st i o n s ?