SlideShare a Scribd company logo
DevSecOps
Continuous Security
About me
Venkat Reddy Sree Puram
National Technical Committee member - NCDRC
Steering Committee Member - NISS 2017
Chapter Lead - Hackers Day(Hyderabad Chapter)
Security Analyst - ——————————————
Certifications - *******************
Performs Vulnerability Assessment and Pen-test on
WebApplications
Servers
Mobile Applications
Agenda
Software Development Evolution
a. Waterfall
b. Agile
Introduction to DevOps
DevOps Process
Dark Launching Technique? Implementation in Facebook
DevSecOps
SAST,DAST and SIEM tools
Demo on IBM App scan integration with Jenkins
Cost of Security Bug at different environments and bug bounty
programs initiation
Automating Security Using SAST, DAST and SIEM tools
Software development evolution
DevSecOps
Waterfall
Agile
DevOps
Waterfall Model
Requirements
Design
Testing
Implementation
Deployment
Maintenance
Waterfall Model
PROS
This model is simple and easy to understand and use.
It is easy to manage due to the rigidity of the model(specific deliverables)
Waterfall model works well for smaller projects.
CONS
Poor model for long and ongoing projects.
No working software is produced until late during the life cycle.
High amounts of risk and uncertainty.
Clients requirements may change
Agile
Requirements
R 1
S 1
R nR 3R 2 ………
S 3
S 2
S 1 S 3
S 2
R - Release
S - Sprint
Agile
PROS
Responding to change as required by clients
Faster review cycles (2 to 5 sprints)
Less up-front work
Software will be delivered in shorter time
CONS
Lack of Understanding
Lack of predictability
Gap between two teams
DevOps
Why DevOps Came into Picture?
DevOps is a software development method that highlights collaboration
and open communication between teams(reduce the gap between teams). 
DevOps is about Process
DevOps is about Connections
DevOps is about Tools
DevOps is about Automating everything
Continuous Software delivery
Possible with me
DevOps
What Happens in DevOps?
Automate everything using tools
➢ Continuous development
➢ Continuous integration
➢ Continuous testing
➢ Continuous deployment
➢ Continuous monitoring
Finally,
➢ Greater Customer Satisfaction
➢ Increased Productivity
Planning Phase
In the planning phase all the details related to current build will be
logged in the JIRA and Yutrack
Development Phase
For source code management we have GIT and SVN. These tools help us
in maintaining the code throughout the development lifecycle.
Build Phase
They help you package your code into executable files which can then be
produced into the testing environment.
Testing Phase
For Continuous testing we will use Robotic Automations and some other
reusability code.
Release Phase
For the release phase, automate tools like bamboo are used in the releasing
a build.
Deployment Phase
After the code is tested and ready it will be deployed into production or
the non-developer machine at this stage.
Operations Phase
In the operations phase everything will be monitored by using Security
Incident and Event management (SIEM tools) for security alerts and
misbehaviour of application.
Monitoring Phase
In the monitoring phase, continuous feedbacks will be taken from
customers and also will be monitoring them.
Is every thing Fine
Any challenges
Load on server
scalability issues
Security Issues
What if a new feature is released
and all the client wants to use
the feature at the same time?
Facebook Use case
Facebook
Deployments and Release world wide Servers Meltdown
Multiple
Features
Dark Launching Technique
Dark Launching Technique
It is a technique in which the features are deployed to a small
user base.
This user base is continuously monitored and their feedback is
taken and the features are made better by continuous
development and testing.
Facebook, Google, Amazon and Netflix are just a few of them
Dark Launching Technique
Facebook
Features
Phase 1
Phase 2
Phase 3
Facebook
Status
Features
Users
Updated
Features
Status
Users
Continuous Development and Testing
Continuous Monitoring
Continuous
Integration
Continuous
Deployment
Cost of a Security Bug for Fixing
DevSecOps
DevSecOps Continuous Security:
In DevOps we are automating everything including continuous
deployments. The concept is to integrate Security Tests and Scans in
the continuous process by Automating SAST,DAST and SIEM tools.
SAST
SAST(Static application security testing)
SAST is a set of technologies designed to analyse application source code, byte code
and binaries for coding and design conditions that are indicative of security
vulnerabilities.
Developers write the source code and is checked into SVN or Git.
Before building the code, source code analysis is done by SAST to identify
vulnerabilities
If any Vulnerabilities observed by tool, Developers will be notified as build was
incomplete.
DAST
DAST:(Dynamic Application Security Testing)
DAST is completely a black box Security, it only injects input into Web Applications
and observes the behavior of the application by, again, only observing the external
outputs.
Thus, DAST tools can only point to vulnerabilities but, in contrast to SAST, are
usually not able to provide information to developers on how to fix a detected
issue.
Vulnerability Scanners
DAST POC of IBM App Scan
Comparison
Coverage
Static Analysis
(SAST)
Dynamic Analysis
(DAST)
Pentest
(PT)
Custom Code 100% 25 25
Libraries 0 25 25
Frameworks 0 25 50
Application Server 0 25 50
Runtime Platform 0 25 50
Business issues 0 0 75
Architecture
Reported XSS and SQL Injection flaws in ******** Router
Downloaded 2,80,000 students profiles from a exam vendor and
reported them.
Reported payment issues in 20+ applications, how was able to
purchase everything for 0.01 rupee.
Reported SQL injections in many university websites
Reported information leakage of internal employees data(mobile,
name, email, etc.) of popular wallet.
Etc……..
Submissions
Never report any vulnerability to the owner unless they announce
Bug Bounty Programme
Never hire any one for just managing/performing VA scans.
Never disclose vulnerability findings anywhere
Never trust VPN, TOR, Proxies (who knows vpn provides may share/
sell details by insiders or when did a social engineering attacks?
Do not do
SUGGESTION: Use Wi-Fi(VPN(TOR/Proxies)) + WarDriving
Vulnerable Web Applications(Offline)
Damn Vulnerable Web App (DVWA) - http://www.dvwa.co.uk/

bWAPP - http://www.mmeit.be/bwapp/ 

Foundstone Hackme Bank - http://www.mcafee.com/us/
downloads/free-tools/hacme-bank.aspx

OWASP Bricks - http://sourceforge.net/projects/owaspbricks/

sqli-labs - https://github.com/Audi-1/sqli-labs 

PentesterLab - https://pentesterlab.com/

Foundstone Hackme Travel - http://www.mcafee.com/us/
downloads/free-tools/hacmetravel.aspx 

DOWNLOAD FREE PROJECTS FROM GOOGLE
Vulnerable Web Applications(online)
IBM altoromutual - http://demo.testfire.net/

Acunetix acuforum - http://testasp.vulnweb.com/

Acunetix acublog - http://testphp.vulnweb.com/

HP freebank - http://zero.webappsecurity.com

NTOSpider Test Site - http://www.webscantest.com/

DOWNLOAD FREE PROJECTS FROM GOOGLE
Vulnerable Operating System
Damn Vulnerable Linux - http://sourceforge.net/projects/
virtualhacking/files/os/dvl

Pentester Lab - https://www.pentesterlab.com/exercises

Metasploitable - http://sourceforge.net/projects/
virtualhacking/files/os/metasploitable/

Kioptrix - http://www.kioptrix.com/blog/

DOWNLOAD FREE PROJECTS FROM GOOGLE
Vulnerable Mobile Applications
Damn Vulnerable iOS App (DVIA) - http://
damnvulnerableiosapp.com/

Hacme Bank Android- http://www.mcafee.com/us/
downloads/free-tools/hacme-bank-android.aspx

InsecureBank - http://www.paladion.net/downloadapp.html

Damn Vulnerable Android App (DVAA) - https://
code.google.com/p/dvaa/ 

DOWNLOAD FREE PROJECTS FROM GOOGLE

More Related Content

What's hot

Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
Mohammed A. Imran
 
Secure Software Development Life Cycle (SSDLC)
Secure Software Development Life Cycle (SSDLC)Secure Software Development Life Cycle (SSDLC)
Secure Software Development Life Cycle (SSDLC)
Aymeric Lagier
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
BATbern
 
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOpsDevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
Michael Man
 
Snyk Intro - Developer Security Essentials 2022
Snyk Intro - Developer Security Essentials 2022Snyk Intro - Developer Security Essentials 2022
Snyk Intro - Developer Security Essentials 2022
Liran Tal
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
Stefan Streichsbier
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
Rubal Jain
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Cheah Eng Soon
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
Amazon Web Services
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
Amazon Web Services
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
NotSoSecure Global Services
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
Derek E. Weeks
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
DevOps Indonesia
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
DevOps Indonesia
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
abhimanyubhogwan
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
Denim Group
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
Michelangelo van Dam
 

What's hot (20)

Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1
 
Secure Software Development Life Cycle (SSDLC)
Secure Software Development Life Cycle (SSDLC)Secure Software Development Life Cycle (SSDLC)
Secure Software Development Life Cycle (SSDLC)
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOpsDevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
 
Snyk Intro - Developer Security Essentials 2022
Snyk Intro - Developer Security Essentials 2022Snyk Intro - Developer Security Essentials 2022
Snyk Intro - Developer Security Essentials 2022
 
DevSecOps - The big picture
DevSecOps - The big pictureDevSecOps - The big picture
DevSecOps - The big picture
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Implementing DevSecOps
Implementing DevSecOpsImplementing DevSecOps
Implementing DevSecOps
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
DevSecOps Implementation Journey
DevSecOps Implementation JourneyDevSecOps Implementation Journey
DevSecOps Implementation Journey
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
A New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFixA New View of Your Application Security Program with Snyk and ThreadFix
A New View of Your Application Security Program with Snyk and ThreadFix
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
 

Similar to DevSecOps

DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
Suman Sourav
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
Opsta
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
Suman Sourav
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
Mykhailo Antonishyn
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
Checkmarx
 
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
Agile Testing Alliance
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
James Wickett
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery Pipelines
Avi Networks
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
Black Duck by Synopsys
 
SCALABLE CI CD DEVOPS
SCALABLE CI CD DEVOPSSCALABLE CI CD DEVOPS
SCALABLE CI CD DEVOPS
G R VISHAL
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
University of Antwerp
 
Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016
Al-Mamun Akanda
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
SaiBhaskar-Resume
SaiBhaskar-ResumeSaiBhaskar-Resume
SaiBhaskar-Resume
Saibhaskar Yenumula
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
Stefan Streichsbier
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
Steven Carlson
 
IRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLC
IRJET Journal
 

Similar to DevSecOps (20)

DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOpsDevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
DevSecOps Indonesia : Pain & Pleasure of doing AppSec in DevOps
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
 
Pragmatic Pipeline Security
Pragmatic Pipeline SecurityPragmatic Pipeline Security
Pragmatic Pipeline Security
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery Pipelines
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
SCALABLE CI CD DEVOPS
SCALABLE CI CD DEVOPSSCALABLE CI CD DEVOPS
SCALABLE CI CD DEVOPS
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
 
Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
SaiBhaskar-Resume
SaiBhaskar-ResumeSaiBhaskar-Resume
SaiBhaskar-Resume
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
 
IRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLCIRJET- Research Study on Testing Mantle in SDLC
IRJET- Research Study on Testing Mantle in SDLC
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 

DevSecOps

  • 2.
  • 3. About me Venkat Reddy Sree Puram National Technical Committee member - NCDRC Steering Committee Member - NISS 2017 Chapter Lead - Hackers Day(Hyderabad Chapter) Security Analyst - —————————————— Certifications - ******************* Performs Vulnerability Assessment and Pen-test on WebApplications Servers Mobile Applications
  • 4. Agenda Software Development Evolution a. Waterfall b. Agile Introduction to DevOps DevOps Process Dark Launching Technique? Implementation in Facebook DevSecOps SAST,DAST and SIEM tools Demo on IBM App scan integration with Jenkins Cost of Security Bug at different environments and bug bounty programs initiation Automating Security Using SAST, DAST and SIEM tools
  • 7. Waterfall Model PROS This model is simple and easy to understand and use. It is easy to manage due to the rigidity of the model(specific deliverables) Waterfall model works well for smaller projects. CONS Poor model for long and ongoing projects. No working software is produced until late during the life cycle. High amounts of risk and uncertainty. Clients requirements may change
  • 9. Requirements R 1 S 1 R nR 3R 2 ……… S 3 S 2 S 1 S 3 S 2 R - Release S - Sprint
  • 10. Agile PROS Responding to change as required by clients Faster review cycles (2 to 5 sprints) Less up-front work Software will be delivered in shorter time CONS Lack of Understanding Lack of predictability Gap between two teams
  • 11.
  • 12. DevOps Why DevOps Came into Picture? DevOps is a software development method that highlights collaboration and open communication between teams(reduce the gap between teams).  DevOps is about Process DevOps is about Connections DevOps is about Tools DevOps is about Automating everything Continuous Software delivery
  • 13.
  • 14.
  • 16. DevOps What Happens in DevOps? Automate everything using tools ➢ Continuous development ➢ Continuous integration ➢ Continuous testing ➢ Continuous deployment ➢ Continuous monitoring Finally, ➢ Greater Customer Satisfaction ➢ Increased Productivity
  • 17. Planning Phase In the planning phase all the details related to current build will be logged in the JIRA and Yutrack
  • 18. Development Phase For source code management we have GIT and SVN. These tools help us in maintaining the code throughout the development lifecycle.
  • 19. Build Phase They help you package your code into executable files which can then be produced into the testing environment.
  • 20. Testing Phase For Continuous testing we will use Robotic Automations and some other reusability code.
  • 21. Release Phase For the release phase, automate tools like bamboo are used in the releasing a build.
  • 22. Deployment Phase After the code is tested and ready it will be deployed into production or the non-developer machine at this stage.
  • 23. Operations Phase In the operations phase everything will be monitored by using Security Incident and Event management (SIEM tools) for security alerts and misbehaviour of application.
  • 24. Monitoring Phase In the monitoring phase, continuous feedbacks will be taken from customers and also will be monitoring them.
  • 25. Is every thing Fine Any challenges Load on server scalability issues Security Issues
  • 26. What if a new feature is released and all the client wants to use the feature at the same time?
  • 27. Facebook Use case Facebook Deployments and Release world wide Servers Meltdown Multiple Features
  • 29. Dark Launching Technique It is a technique in which the features are deployed to a small user base. This user base is continuously monitored and their feedback is taken and the features are made better by continuous development and testing. Facebook, Google, Amazon and Netflix are just a few of them
  • 31. Facebook Status Features Users Updated Features Status Users Continuous Development and Testing Continuous Monitoring Continuous Integration Continuous Deployment
  • 32. Cost of a Security Bug for Fixing
  • 33. DevSecOps DevSecOps Continuous Security: In DevOps we are automating everything including continuous deployments. The concept is to integrate Security Tests and Scans in the continuous process by Automating SAST,DAST and SIEM tools.
  • 34. SAST SAST(Static application security testing) SAST is a set of technologies designed to analyse application source code, byte code and binaries for coding and design conditions that are indicative of security vulnerabilities. Developers write the source code and is checked into SVN or Git. Before building the code, source code analysis is done by SAST to identify vulnerabilities If any Vulnerabilities observed by tool, Developers will be notified as build was incomplete.
  • 35.
  • 36.
  • 37. DAST DAST:(Dynamic Application Security Testing) DAST is completely a black box Security, it only injects input into Web Applications and observes the behavior of the application by, again, only observing the external outputs. Thus, DAST tools can only point to vulnerabilities but, in contrast to SAST, are usually not able to provide information to developers on how to fix a detected issue. Vulnerability Scanners
  • 38. DAST POC of IBM App Scan
  • 39. Comparison Coverage Static Analysis (SAST) Dynamic Analysis (DAST) Pentest (PT) Custom Code 100% 25 25 Libraries 0 25 25 Frameworks 0 25 50 Application Server 0 25 50 Runtime Platform 0 25 50 Business issues 0 0 75
  • 41.
  • 42. Reported XSS and SQL Injection flaws in ******** Router Downloaded 2,80,000 students profiles from a exam vendor and reported them. Reported payment issues in 20+ applications, how was able to purchase everything for 0.01 rupee. Reported SQL injections in many university websites Reported information leakage of internal employees data(mobile, name, email, etc.) of popular wallet. Etc…….. Submissions
  • 43. Never report any vulnerability to the owner unless they announce Bug Bounty Programme Never hire any one for just managing/performing VA scans. Never disclose vulnerability findings anywhere Never trust VPN, TOR, Proxies (who knows vpn provides may share/ sell details by insiders or when did a social engineering attacks? Do not do SUGGESTION: Use Wi-Fi(VPN(TOR/Proxies)) + WarDriving
  • 44. Vulnerable Web Applications(Offline) Damn Vulnerable Web App (DVWA) - http://www.dvwa.co.uk/ bWAPP - http://www.mmeit.be/bwapp/  Foundstone Hackme Bank - http://www.mcafee.com/us/ downloads/free-tools/hacme-bank.aspx OWASP Bricks - http://sourceforge.net/projects/owaspbricks/ sqli-labs - https://github.com/Audi-1/sqli-labs PentesterLab - https://pentesterlab.com/ Foundstone Hackme Travel - http://www.mcafee.com/us/ downloads/free-tools/hacmetravel.aspx  DOWNLOAD FREE PROJECTS FROM GOOGLE
  • 45. Vulnerable Web Applications(online) IBM altoromutual - http://demo.testfire.net/ Acunetix acuforum - http://testasp.vulnweb.com/ Acunetix acublog - http://testphp.vulnweb.com/ HP freebank - http://zero.webappsecurity.com NTOSpider Test Site - http://www.webscantest.com/ DOWNLOAD FREE PROJECTS FROM GOOGLE
  • 46. Vulnerable Operating System Damn Vulnerable Linux - http://sourceforge.net/projects/ virtualhacking/files/os/dvl Pentester Lab - https://www.pentesterlab.com/exercises Metasploitable - http://sourceforge.net/projects/ virtualhacking/files/os/metasploitable/ Kioptrix - http://www.kioptrix.com/blog/ DOWNLOAD FREE PROJECTS FROM GOOGLE
  • 47. Vulnerable Mobile Applications Damn Vulnerable iOS App (DVIA) - http:// damnvulnerableiosapp.com/ Hacme Bank Android- http://www.mcafee.com/us/ downloads/free-tools/hacme-bank-android.aspx InsecureBank - http://www.paladion.net/downloadapp.html Damn Vulnerable Android App (DVAA) - https:// code.google.com/p/dvaa/  DOWNLOAD FREE PROJECTS FROM GOOGLE