SlideShare a Scribd company logo
1 of 27
Download to read offline
DEVSECOPS
A Secure SDLC in the
Age of DevOps and
Hyper-Automation
By Alex Senkevitch, CISSP, CISM
ISSA Wisconsin
January Lunch Meeting
08 Jan 2019
i
WHAT’S IN STORE
1.0 Background (this stuff)
2.0 A Birth of a Paradigm
3.0 Throwing the Baby Out With the Bath Water
4.0 A More Mature Pipeline
5.0 Q&A
i
YOUR SPEAKER TODAY IS…
Alex Senkevitch, CISSP, CISM
o Security researcher and architect for over 20 years
o Working for/consulting to Fortune 500/Global 2000 for 20 years
o Worked in embedded systems and network engineering before that
o Have patents in multi-tiered security and event analytics systems
o Former product manager at Veracode (MPT product)
o Have been architecting and developing DevSecOps implementations since
2012
THE BIRTH OF A PARADIGM 2.0
What Did I Miss?
i
IN THE BEGINNING, THERE WERE THREE…
o Traditional production software ecosystem:
o Three Discrete Stakeholders: Development, Operations, Security
o Discrete Subject Matter Experts (SMEs) on dedicated teams, attempting to work together
o Ideally: Functional, Stable, and Secure software solutions are the result
o Attempts to streamline “operations” made by both developers and operations:
o Developers wanted to reduce/remove obstacles to the market (speed things up)
o Operations wanted to make their day-to-day “easier” (on-call is no fun, especially for thousands of servers)
o Technology and development architecture was mostly “static”
o Enter “DevOps” (circa 2009)…
WHEN THREE BECOME TWO… 2.1
The Emergence of DevOps
i
A PHILOSOPHY EMERGES - DEVOPS
o Started as an Agile development philosophy circa 2009 (linked to Patrick Debois)
o Originated from the Developer perspective (“if only we didn’t have to deal with the ops
team”)
o Adopted mostly from desperation and euphoria, but viewed as “the answer”
o As of today, there still is no standardized definition of it—proper and correct are in the eye of the implementor
o Why did it get so much traction so fast?
o Simple…
o Development is directly tied to revenue
o Operations directly to expense
o Elevator pitch: Automation of “operations” equals “cost reduction” (immediate ROI)
o Security still largely left to status quo approaches initially
i
THE TECH DISRUPTION
o Petabyte Datacenters become mainstream (circa 2008-2009), start eclipsing exabyte DCs
o Google, Facebook, Amazon vs. Rackspace and Server Central
o Managed Services start to decouple from underlying bare metal
o OpenStack introduces first serious vendor agnostic data center orchestration (2010)
o Everything starts shifting from static to dynamic in nature (e.g., “software defined”)
o Cloud Service Providers (CSPs) started to emerge as viable alternatives, not a novelty (2011)
o CSPs started to push the notion of “immutable infrastructure” as core to their service
o “Pets vs. Cattle” emerged as the paradigm
o Stop “raising” servers, and start driving the herd—Infrastructure-as-Code was born
i
PUNCTUATED EQUILIBRIUM: DEVOPS AS A
PRACTICE
o By 2012 there was a convergence—philosophy found technology innovation
o Patterns of practice emerged
o With the advent of implementation patterns, and adoption by CSPs, the migration from
traditional managed services data centers started to shift into the cloud
o “Cloud Native” came to equate to “DevOps native”
o Provisioning occurred through APIs and SDKs (“Ahha! We speak native Developer!”)
o Traditional data centers were left to try and implement some kind of “DevOps” (cue the vendors!)
o This new practice was defined by its dependency upon automation
o Continuous Integration (CI) solutions were tapped for code quality and build processes
o Continuous Deployment (CD) solutions were brought in to bridge CI into the elastic realm
o The CI/CD pipeline was born
AND WHEN TWO BECOME ONE 2.2
DevSecOps is Born
i
“IT WORKED FOR OPS…”
o By 2016, with AWS exponentially growing, the notion of DevSecOps became a thing in earnest
o Security viewed as the last hurdle to immediate time to market
o One of the themes of AWS’s re:invent 2017 was “Compliance-as-Code”
o The notion of automating security controls and compliance checks holistically in DevOps
o More and more articles and seminars were being held where Security was now being rolled into
DevOps
o This was done, in part, as assurance that “Cloud Native” did not mean “World Readable”
o Dozens of major S3 world readable breaches were making headlines in 2017
o Checking S3 bucket permissions topped the Trusted Advisor list
o Simultaneously, a whole new lineup of startups were rolling out new security software for automated
security processes within automation
o The establishment was no longer established
i
WE HAVE DEVSECOPS—NOW WHAT?
o So started the free-for-all
o Traditional security organizations resisted
o Stronger developer organizations started to prevail
o New security tech started to be produced in the commercial and Open Source markets
o Developers started evaluating their own solutions
o It’s automatable, right?
o We just need one of these, and one of those, right?
o Security orgs started to be bypassed since developers could start to demonstrate
compensating controls
o Or so they thought
o Initial DevSecOps attempts re-surfaced weak practices and discretionary controls
enforcement
THROWING THE BABY OUT WITH THE
BATH WATER
3.0
Lessons From the Field:
Learning the Hard Way…
All Over Again
i
“Those who fail to learn from history are condemned to repeat it.”
- Winston Churchill, 1948
i
AUTOMATION WILL SOLVE EVERYTHING, RIGHT?
o Automation viewed as more infallible
o Faster
o More capable of parallel execution
o Removes the “inefficient human” from the process
o Security functions started to get codified and automated…by non-security personnel
o Achieved coverage wasn’t as comprehensive as first believed
o If a process couldn’t return in “cloud time” (minutes), then it was viewed as an outlier
o Unnecessary prior to deployment and would be dealt with “at some other time”
o Errors now occurred at “cloud speed”
o Coverage suffered
i
BREAK GLASS: WHEN MANDATORY BECOMES
DISCRETIONARY?
o It is not uncommon, in the event of “hardship”, security controls can simply be
dropped/disabled (they’re just YAML configs, after all)
o Most DevOps orgs originated as development orgs first—functionality first
o Very few outside of the original security teams understand the fiduciary responsibility of security
o Compliance controls are usually included in the break glass overrides
o In a DevOps world, there really is no such thing as Mandatory Access Controls (MAC)
o If the automation administrator doesn’t agree with security directives…
i
FAILURE IS OPTIONAL
o So you get all this security automation setup in your pipeline
o However, the dev manager doesn’t like their builds being “failed” (halted)
o They would prefer you just send them an email with errors, but let them proceed
o (Reference previous “Break Glass”)
i
ONE TOOL IS AS GOOD AS ANOTHER
o Failure to understand what security tools and technologies actually do
o Software Composition Analysis is the same as Static Analysis, right?
o When non-security personnel select the security tooling, coverage can suffer mightily
o There can also be a tendency to only implement one or two types of coverage
i
ALL SECURITY OUTPUT IS THE SAME
o As different tools are used, they can be viewed as all having the same type and depth of
output
o “They’re all reporting ‘vulnerabilities’…it’s all the same”
o There can be a lack of understanding about data convergence and enrichment
o Different tools can report the same finding, but different facets
o In a hybrid pipeline, data convergence becomes very important
o Provide a single actionable finding data stream
A MORE MATURE PIPELINE 3.0
i
QUICK REVIEW: TYPES OF SECURITY FUNCTIONS
o Software Composition Analysis (SCA) – Scans third-party packages/code, usually by version
specific hashes
o Very fast (minutes); but only covers those file hashes it has records for—may miss files
o Static Application Security Testing (SAST), “Static” – Scans source code or binary files
o Moderate (hours); provides much better coverage, but has problems with hierarchy and very prone to FPs
o Dynamic Application Security Testing (DAST), “Dynamic” – Traditional network-based scanning
o Moderate-to-fast (hours); provides reasonable breadth-wise coverage, some depth—not as many FPs
o Manual Testing, “Pen Testing” – Provides the most comprehensive breadth and depth-wise tests
o SLOW (days); provides best identification of complex attack vectors, but can’t cover as much real-estate
o Hybridized Functions:
o Custom scripts, pre-commit hooks, IDE integrations, etc.
i
WHAT DO WE REALLY NEED TO TEST?
o The Code Pyramid:
o Third-Party – The lion’s share, can be scanned
with SCA
o WARNING: Not all SCAs scan as deeply
o Configuration/IaC – can also be scanned with
(certain) SCAs [mostly commercial]
o Custom Code – this is where we should be
spending most of our time and resources
o This is the Intellectual Property we’ve developed
Moderate-
Hard
Quick
Quick-ish
i
HERE’S WHAT TO WORRY ABOUT
o Focus on the “Custom Code” portion
o Generally comprised of:
o Configurations (deployment descriptors, etc.)
o Network-bound Layer (services, etc.)
o Internal Code
o Internal Code is where the highest latent risk potentials
will be
i
THINGS TO LOOK AT WHEN SELECTING TOOLS
o SCA lives and dies on two things:
o How many VDBs it pulls from (diversity of signatures)
o How far up the third-party stack it can go (can also include container awareness)
o SAST will be a love/hate tech, but you don’t have much choice:
o Will most likely be very noisy (high FP rates)
o Is subject to “rule drift” – when the vendor suddenly starts righting rules for langs you don’t care about, and not for the
ones you do
o Usually can’t really see externally facing “endpoints” (i.e., what you can talk to from the network)
o If your devs like “wrapping”/nesting everything, it will probably have some issues with it
o DAST can be good at enumerating initial network endpoints/injection points
o Usually not as high a FP rate as SAST
o Starts to “spin” the deeper into the running app it goes (e.g., custom injection testing, etc.)
o Traditionally has issues with APIs of just about any sort (again, subject to “drift”)
i
PIPELINE STRATEGIES
o Pick a single SCA solution capable of scanning up to the edge of your custom code
o Open Source can be nice, but not if it’s missing the most obvious low hanging fruit (i.e., doesn’t scan NPMs)
o Use triggered AND scheduled SAST actions
o Trigger off a post-commit hook for specific branches (merge/feature/release branches)
o Schedule jobs to run on the entire repo over time (you don’t have to wait for a dev to do something)
o Use Case: Use scheduled jobs to create project baselines and triggered jobs to do differential scans
o Use DAST in the system integration stage—if it’s not all together and running, you can’t scan it
o Use a tiered execution strategy with graduated SLAs—fastest first and most often, slower later and less
often
o Do NOT skip a manual test!! Make that the highest tier and farthest out in the pipeline, but it MUST be done to find
complex attack vectors.
o NOTE: If you current manual tests are showing nothing but “scanner fluff”, consider a different manual test provider
i
DON’T BE AFRAID OF DATA PROCESSING
o There’s a lot of data coming, it’s the data economy
o Don’t be afraid to leverage the major advances in data convergence/enrichment for the
output from the security tools
o Also think about external integrations
o Email notices are so 10 years ago
o Think about integrating converged findings into a “single pane of glass” (e.g., issue tracker)
QUESTIONS & ANSWERS

More Related Content

What's hot

Oleksandr Valetskyy - Become a .NET dependency injection ninja with Ninject
Oleksandr Valetskyy - Become a .NET dependency injection ninja with NinjectOleksandr Valetskyy - Become a .NET dependency injection ninja with Ninject
Oleksandr Valetskyy - Become a .NET dependency injection ninja with NinjectOleksandr Valetskyy
 
Mitigating Java Deserialization attacks from within the JVM
Mitigating Java Deserialization attacks from within the JVMMitigating Java Deserialization attacks from within the JVM
Mitigating Java Deserialization attacks from within the JVMApostolos Giannakidis
 
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...DevSecCon
 
Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Guy Podjarny
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 
Introduction to iOS Penetration Testing
Introduction to iOS Penetration TestingIntroduction to iOS Penetration Testing
Introduction to iOS Penetration TestingOWASP
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackIJRESJOURNAL
 
DevSecCon Boston 2018: Secure by Design by Chris Wysopal
DevSecCon Boston 2018: Secure by Design by Chris WysopalDevSecCon Boston 2018: Secure by Design by Chris Wysopal
DevSecCon Boston 2018: Secure by Design by Chris WysopalDevSecCon
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩vlymfb
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmapsecurityxploded
 
85320337 networking-case-study
85320337 networking-case-study85320337 networking-case-study
85320337 networking-case-studyhomeworkping3
 
Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Matt Raible
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approachAntonio Parata
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...Consulthinkspa
 
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Androidsecurityxploded
 
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...DC2711 - DEF CON GROUP - Johannesburg
 

What's hot (19)

Oleksandr Valetskyy - Become a .NET dependency injection ninja with Ninject
Oleksandr Valetskyy - Become a .NET dependency injection ninja with NinjectOleksandr Valetskyy - Become a .NET dependency injection ninja with Ninject
Oleksandr Valetskyy - Become a .NET dependency injection ninja with Ninject
 
Sample06
Sample06Sample06
Sample06
 
Mitigating Java Deserialization attacks from within the JVM
Mitigating Java Deserialization attacks from within the JVMMitigating Java Deserialization attacks from within the JVM
Mitigating Java Deserialization attacks from within the JVM
 
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
 
App locker
App lockerApp locker
App locker
 
Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)Stranger Danger: Securing Third Party Components (Tech2020)
Stranger Danger: Securing Third Party Components (Tech2020)
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
Introduction to iOS Penetration Testing
Introduction to iOS Penetration TestingIntroduction to iOS Penetration Testing
Introduction to iOS Penetration Testing
 
Devoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection AttackDevoid Web Application From SQL Injection Attack
Devoid Web Application From SQL Injection Attack
 
DevSecCon Boston 2018: Secure by Design by Chris Wysopal
DevSecCon Boston 2018: Secure by Design by Chris WysopalDevSecCon Boston 2018: Secure by Design by Chris Wysopal
DevSecCon Boston 2018: Secure by Design by Chris Wysopal
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmap
 
85320337 networking-case-study
85320337 networking-case-study85320337 networking-case-study
85320337 networking-case-study
 
Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020Security Patterns for Microservice Architectures - London Java Community 2020
Security Patterns for Microservice Architectures - London Java Community 2020
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approach
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Android
 
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
Alexandre Borges - Advanced Malware: rootkits, .NET and BIOS/UEFI threats - D...
 

Similar to DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation

SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesMighty Guides, Inc.
 
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
DevSecOps in the Cloud from the Lens of a  Well-Architected Framework.pptxDevSecOps in the Cloud from the Lens of a  Well-Architected Framework.pptx
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptxTurja Narayan Chaudhuri
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySeniorStoryteller
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Deliverydevopsdaysaustin
 
Practical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOpsPractical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOpsPriyanka Aash
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsJames '​-- Mckinlay
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseJames Wickett
 
Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)dhubbard858
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeLacework
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerAdrian Sanabria
 
DevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood InnocenceDevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood InnocenceRobert Douglass
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Tripwire
 
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...Daniel Bryant
 
Resetting Your Security Thinking for the Public Cloud
Resetting Your Security Thinking for the Public CloudResetting Your Security Thinking for the Public Cloud
Resetting Your Security Thinking for the Public CloudMighty Guides, Inc.
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️Ori Pekelman
 
How not to fall into the DevSecOps trap
How not to fall into the DevSecOps trapHow not to fall into the DevSecOps trap
How not to fall into the DevSecOps trapMatteo Emili
 
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)Steve Poole
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 

Similar to DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation (20)

SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
The Future of DevSecOps
The Future of DevSecOpsThe Future of DevSecOps
The Future of DevSecOps
 
Avoiding Container Vulnerabilities
Avoiding Container VulnerabilitiesAvoiding Container Vulnerabilities
Avoiding Container Vulnerabilities
 
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
DevSecOps in the Cloud from the Lens of a  Well-Architected Framework.pptxDevSecOps in the Cloud from the Lens of a  Well-Architected Framework.pptx
DevSecOps in the Cloud from the Lens of a Well-Architected Framework.pptx
 
Safely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous DeliverySafely Removing the Last Roadblock to Continuous Delivery
Safely Removing the Last Roadblock to Continuous Delivery
 
2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery2016 - Safely Removing the Last Roadblock to Continuous Delivery
2016 - Safely Removing the Last Roadblock to Continuous Delivery
 
Practical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOpsPractical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOps
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
DevOps for Defenders in the Enterprise
DevOps for Defenders in the EnterpriseDevOps for Defenders in the Enterprise
DevOps for Defenders in the Enterprise
 
Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)Security for AWS : Journey to Least Privilege (update)
Security for AWS : Journey to Least Privilege (update)
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least Privilege
 
Cloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security PractitionerCloud, DevOps and the New Security Practitioner
Cloud, DevOps and the New Security Practitioner
 
DevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood InnocenceDevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood Innocence
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
 
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
DevoxxUK 2016: "DevOps: Microservices, containers, platforms, tooling... Oh y...
 
Resetting Your Security Thinking for the Public Cloud
Resetting Your Security Thinking for the Public CloudResetting Your Security Thinking for the Public Cloud
Resetting Your Security Thinking for the Public Cloud
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️
 
How not to fall into the DevSecOps trap
How not to fall into the DevSecOps trapHow not to fall into the DevSecOps trap
How not to fall into the DevSecOps trap
 
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
The Anatomy of Java Vulnerabilities (Devoxx UK 2017)
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 

DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation

  • 1. DEVSECOPS A Secure SDLC in the Age of DevOps and Hyper-Automation By Alex Senkevitch, CISSP, CISM ISSA Wisconsin January Lunch Meeting 08 Jan 2019
  • 2. i WHAT’S IN STORE 1.0 Background (this stuff) 2.0 A Birth of a Paradigm 3.0 Throwing the Baby Out With the Bath Water 4.0 A More Mature Pipeline 5.0 Q&A
  • 3. i YOUR SPEAKER TODAY IS… Alex Senkevitch, CISSP, CISM o Security researcher and architect for over 20 years o Working for/consulting to Fortune 500/Global 2000 for 20 years o Worked in embedded systems and network engineering before that o Have patents in multi-tiered security and event analytics systems o Former product manager at Veracode (MPT product) o Have been architecting and developing DevSecOps implementations since 2012
  • 4. THE BIRTH OF A PARADIGM 2.0 What Did I Miss?
  • 5. i IN THE BEGINNING, THERE WERE THREE… o Traditional production software ecosystem: o Three Discrete Stakeholders: Development, Operations, Security o Discrete Subject Matter Experts (SMEs) on dedicated teams, attempting to work together o Ideally: Functional, Stable, and Secure software solutions are the result o Attempts to streamline “operations” made by both developers and operations: o Developers wanted to reduce/remove obstacles to the market (speed things up) o Operations wanted to make their day-to-day “easier” (on-call is no fun, especially for thousands of servers) o Technology and development architecture was mostly “static” o Enter “DevOps” (circa 2009)…
  • 6. WHEN THREE BECOME TWO… 2.1 The Emergence of DevOps
  • 7. i A PHILOSOPHY EMERGES - DEVOPS o Started as an Agile development philosophy circa 2009 (linked to Patrick Debois) o Originated from the Developer perspective (“if only we didn’t have to deal with the ops team”) o Adopted mostly from desperation and euphoria, but viewed as “the answer” o As of today, there still is no standardized definition of it—proper and correct are in the eye of the implementor o Why did it get so much traction so fast? o Simple… o Development is directly tied to revenue o Operations directly to expense o Elevator pitch: Automation of “operations” equals “cost reduction” (immediate ROI) o Security still largely left to status quo approaches initially
  • 8. i THE TECH DISRUPTION o Petabyte Datacenters become mainstream (circa 2008-2009), start eclipsing exabyte DCs o Google, Facebook, Amazon vs. Rackspace and Server Central o Managed Services start to decouple from underlying bare metal o OpenStack introduces first serious vendor agnostic data center orchestration (2010) o Everything starts shifting from static to dynamic in nature (e.g., “software defined”) o Cloud Service Providers (CSPs) started to emerge as viable alternatives, not a novelty (2011) o CSPs started to push the notion of “immutable infrastructure” as core to their service o “Pets vs. Cattle” emerged as the paradigm o Stop “raising” servers, and start driving the herd—Infrastructure-as-Code was born
  • 9. i PUNCTUATED EQUILIBRIUM: DEVOPS AS A PRACTICE o By 2012 there was a convergence—philosophy found technology innovation o Patterns of practice emerged o With the advent of implementation patterns, and adoption by CSPs, the migration from traditional managed services data centers started to shift into the cloud o “Cloud Native” came to equate to “DevOps native” o Provisioning occurred through APIs and SDKs (“Ahha! We speak native Developer!”) o Traditional data centers were left to try and implement some kind of “DevOps” (cue the vendors!) o This new practice was defined by its dependency upon automation o Continuous Integration (CI) solutions were tapped for code quality and build processes o Continuous Deployment (CD) solutions were brought in to bridge CI into the elastic realm o The CI/CD pipeline was born
  • 10. AND WHEN TWO BECOME ONE 2.2 DevSecOps is Born
  • 11. i “IT WORKED FOR OPS…” o By 2016, with AWS exponentially growing, the notion of DevSecOps became a thing in earnest o Security viewed as the last hurdle to immediate time to market o One of the themes of AWS’s re:invent 2017 was “Compliance-as-Code” o The notion of automating security controls and compliance checks holistically in DevOps o More and more articles and seminars were being held where Security was now being rolled into DevOps o This was done, in part, as assurance that “Cloud Native” did not mean “World Readable” o Dozens of major S3 world readable breaches were making headlines in 2017 o Checking S3 bucket permissions topped the Trusted Advisor list o Simultaneously, a whole new lineup of startups were rolling out new security software for automated security processes within automation o The establishment was no longer established
  • 12. i WE HAVE DEVSECOPS—NOW WHAT? o So started the free-for-all o Traditional security organizations resisted o Stronger developer organizations started to prevail o New security tech started to be produced in the commercial and Open Source markets o Developers started evaluating their own solutions o It’s automatable, right? o We just need one of these, and one of those, right? o Security orgs started to be bypassed since developers could start to demonstrate compensating controls o Or so they thought o Initial DevSecOps attempts re-surfaced weak practices and discretionary controls enforcement
  • 13. THROWING THE BABY OUT WITH THE BATH WATER 3.0 Lessons From the Field: Learning the Hard Way… All Over Again
  • 14. i “Those who fail to learn from history are condemned to repeat it.” - Winston Churchill, 1948
  • 15. i AUTOMATION WILL SOLVE EVERYTHING, RIGHT? o Automation viewed as more infallible o Faster o More capable of parallel execution o Removes the “inefficient human” from the process o Security functions started to get codified and automated…by non-security personnel o Achieved coverage wasn’t as comprehensive as first believed o If a process couldn’t return in “cloud time” (minutes), then it was viewed as an outlier o Unnecessary prior to deployment and would be dealt with “at some other time” o Errors now occurred at “cloud speed” o Coverage suffered
  • 16. i BREAK GLASS: WHEN MANDATORY BECOMES DISCRETIONARY? o It is not uncommon, in the event of “hardship”, security controls can simply be dropped/disabled (they’re just YAML configs, after all) o Most DevOps orgs originated as development orgs first—functionality first o Very few outside of the original security teams understand the fiduciary responsibility of security o Compliance controls are usually included in the break glass overrides o In a DevOps world, there really is no such thing as Mandatory Access Controls (MAC) o If the automation administrator doesn’t agree with security directives…
  • 17. i FAILURE IS OPTIONAL o So you get all this security automation setup in your pipeline o However, the dev manager doesn’t like their builds being “failed” (halted) o They would prefer you just send them an email with errors, but let them proceed o (Reference previous “Break Glass”)
  • 18. i ONE TOOL IS AS GOOD AS ANOTHER o Failure to understand what security tools and technologies actually do o Software Composition Analysis is the same as Static Analysis, right? o When non-security personnel select the security tooling, coverage can suffer mightily o There can also be a tendency to only implement one or two types of coverage
  • 19. i ALL SECURITY OUTPUT IS THE SAME o As different tools are used, they can be viewed as all having the same type and depth of output o “They’re all reporting ‘vulnerabilities’…it’s all the same” o There can be a lack of understanding about data convergence and enrichment o Different tools can report the same finding, but different facets o In a hybrid pipeline, data convergence becomes very important o Provide a single actionable finding data stream
  • 20. A MORE MATURE PIPELINE 3.0
  • 21. i QUICK REVIEW: TYPES OF SECURITY FUNCTIONS o Software Composition Analysis (SCA) – Scans third-party packages/code, usually by version specific hashes o Very fast (minutes); but only covers those file hashes it has records for—may miss files o Static Application Security Testing (SAST), “Static” – Scans source code or binary files o Moderate (hours); provides much better coverage, but has problems with hierarchy and very prone to FPs o Dynamic Application Security Testing (DAST), “Dynamic” – Traditional network-based scanning o Moderate-to-fast (hours); provides reasonable breadth-wise coverage, some depth—not as many FPs o Manual Testing, “Pen Testing” – Provides the most comprehensive breadth and depth-wise tests o SLOW (days); provides best identification of complex attack vectors, but can’t cover as much real-estate o Hybridized Functions: o Custom scripts, pre-commit hooks, IDE integrations, etc.
  • 22. i WHAT DO WE REALLY NEED TO TEST? o The Code Pyramid: o Third-Party – The lion’s share, can be scanned with SCA o WARNING: Not all SCAs scan as deeply o Configuration/IaC – can also be scanned with (certain) SCAs [mostly commercial] o Custom Code – this is where we should be spending most of our time and resources o This is the Intellectual Property we’ve developed Moderate- Hard Quick Quick-ish
  • 23. i HERE’S WHAT TO WORRY ABOUT o Focus on the “Custom Code” portion o Generally comprised of: o Configurations (deployment descriptors, etc.) o Network-bound Layer (services, etc.) o Internal Code o Internal Code is where the highest latent risk potentials will be
  • 24. i THINGS TO LOOK AT WHEN SELECTING TOOLS o SCA lives and dies on two things: o How many VDBs it pulls from (diversity of signatures) o How far up the third-party stack it can go (can also include container awareness) o SAST will be a love/hate tech, but you don’t have much choice: o Will most likely be very noisy (high FP rates) o Is subject to “rule drift” – when the vendor suddenly starts righting rules for langs you don’t care about, and not for the ones you do o Usually can’t really see externally facing “endpoints” (i.e., what you can talk to from the network) o If your devs like “wrapping”/nesting everything, it will probably have some issues with it o DAST can be good at enumerating initial network endpoints/injection points o Usually not as high a FP rate as SAST o Starts to “spin” the deeper into the running app it goes (e.g., custom injection testing, etc.) o Traditionally has issues with APIs of just about any sort (again, subject to “drift”)
  • 25. i PIPELINE STRATEGIES o Pick a single SCA solution capable of scanning up to the edge of your custom code o Open Source can be nice, but not if it’s missing the most obvious low hanging fruit (i.e., doesn’t scan NPMs) o Use triggered AND scheduled SAST actions o Trigger off a post-commit hook for specific branches (merge/feature/release branches) o Schedule jobs to run on the entire repo over time (you don’t have to wait for a dev to do something) o Use Case: Use scheduled jobs to create project baselines and triggered jobs to do differential scans o Use DAST in the system integration stage—if it’s not all together and running, you can’t scan it o Use a tiered execution strategy with graduated SLAs—fastest first and most often, slower later and less often o Do NOT skip a manual test!! Make that the highest tier and farthest out in the pipeline, but it MUST be done to find complex attack vectors. o NOTE: If you current manual tests are showing nothing but “scanner fluff”, consider a different manual test provider
  • 26. i DON’T BE AFRAID OF DATA PROCESSING o There’s a lot of data coming, it’s the data economy o Don’t be afraid to leverage the major advances in data convergence/enrichment for the output from the security tools o Also think about external integrations o Email notices are so 10 years ago o Think about integrating converged findings into a “single pane of glass” (e.g., issue tracker)