SlideShare a Scribd company logo
Tenants for Going
at DevSecOps Speed
matt@defectdojo.com
matt.tesauro@owasp.org
https://www.linkedin.com/in/matttesauro/
Matt Tesauro
Who is this guy?
● Reformed programmer & AppSec Engineer
● CTO & Founder of DefectDojo Inc
● 15+ years in the OWASP community
○ OWASP DefectDojo (core maintainer)
○ OWASP Podcast (host)
○ OWASP Global Board of Directors
○ OWASP AppSec Pipeline (co-leader)
○ OWASP WTE (leader)
● 22+ years using FLOSS and Linux
● Go language fanboy
● Ee Dan in Tang Soo Do (2nd degree black belt)
01
2
Fundamental
Truths
The 4
What’s
Overview
02 03 04
Conclusion
Overview
01 Let’s start at the beginning
—Me (Matt Tesauro)
“Time to turn
chaos into calm
and
distress into success.”
Background
This talk was created from the perspective that:
● You’ve been dropped into a AppSec / DevSecOps /
Product Security team as it’s lead
● You need to “do AppSec”
● You have a limited team and budget
● You need:
“A simple system that adapts to complex situations”
The 6
things of
DevSecOps
2 Fundamental Truths
The 4 What’s
Simple Machines
Definition:
“Any of several devices which few or no moving parts
that are used to modify motion and magnitude of a
force in order to perform work.”
● The inclined plane
● The lever
● The wedge
● The wheel and axle
● The pulley
● The screw
Combine these to make complex machines
Simple Machines
+ =
Archimedes’ screw
Let’s Define the
‘Simple Machines’
of DevSecOps
You can then mix and match them to
fit the context in which you work.
The 6
things of
simple machines
DevSecOps
2 Fundamental Truths
The 4 What’s
2 Fundamental Truths
02 The two things the rest depend on
The Ground Truth
Know where you’re starting from
The initial assessment
The Ground Truth
Know where you’re starting from
● Initial broad assessment
● Why?
○ Demonstrate progress
● Measure when you start and regularly re-measure
○ Can’t measure change till the 2nd measurement
○ Get an early measurement to show progress early
What the assessment will find
● Ranges from greenfield to scorched earth
● Nothing exists to a complete, validated list of all apps
within the company
● SaaS company with a single product
○ Warning “Product” is a charged term
○ Product != repo
○ Microservices, Web and Mobile versions, …
What is a Product?
● You need to figure out what this means in context
● Stick to the definition you established
● Maybe make a poster out of it
● Avoids incredible amounts of future confusion
and misunderstanding
● Product X was assessed
versus
A repo that is one of the 6 repos that
makes up Product X was assessed
Understand the scope of your work
● Hopefully covered clearly before you were hired
● There’s no standard
○ Write it down / define it
○ Another poster?
● Apps only, App and Infra, Containers, Cloud, …
● How much of the vulnerability lifecycle do you own?
○ Reporting, Mitigation, Remediation, Retesting?
● Who are your upstream & downstream stakeholders?
Where to get started?
There’s some good frameworks you can use to do an initial
assessment, but first:
● Decide how much time to spend
● Accuracy vs speed
● Iterative is the thing
● Solo vs collaborative
Things to use as a guide:
● OWASP SAMM (Software Assurance Maturity Model)
● OWASP ASVS (Application Security Verification Standard)
● OWASP DSOMM (DevSecOps Maturity Model)
Single Source of Truth
As you move forward, you need a
canonical representation of reality
Canonical Representation of Reality
● It’s very likely you won’t have a full picture
● You need something that adapts and grows over time
● Tool venders will have you log into 27 web consoles
● How to pick a single source of truth?
○ Ability to hold all the data you need flexibly
○ Ability to filter, sort, modify, combine the data
○ Differing views based on stakeholders
○ Dedup, False Positives, Grouping/Merging
I know what you’re thinking..
Current tool for 90% of Enterprise Vulnerability Management Programs
But WHY?
Might I suggest…
Comes in 2 flavors:
OWASP DefectDojo
Comes in 2 flavors:
DefectDojo Pro (SaaS)
Now in beta:
New UI
DefectDojo - a single source of truth
DevSecOps tool created by DevSecOps professionals
for DevSecOps professionals.
● Manages the DevSecOps security program
● Application inventory with robust metadata
● Sort, filter, munge and export the data in multiple ways
● Engagement / assessment tracking
● Supports manual and automated security work
● Deduplication + false positive tracking of findings
● Custom report creation
● Tagging on multiple levels
● Calendar of security activities
● Historical knowledge of past assessments
Why was DefectDojo created?
DefectDojo was born from the frustrations of the product
security team at Rackspace with:
● Tracking manual testing efforts
● Combining output from multiple tools
● Tools having a snowflake way to represent issues
● De-duping and merging/grouping findings
● False-positive management
● Reporting on infra & app issues
● Logging into N vendor motherships
● The need to automate (REST API)
Active project with large community
Monthly release (2.x.0)
Bugfix release every week in between (2.x.y)
Commercial Support is available
https://www.defectdojo.com/
Where to get more info?
Search Youtube for “purple DefectDojo”
The 4 What’s
03 What needs to happen for DevSecOps
Starting
with the
Big Picture
The 4 What’s
Intake
What work do
you own or
comes into
scope?
Triage
What resources
should be used
to fulfill the
goal?
Test
What is the
current security
state?
Deliver
What addresses
the needs of the
downstream
stakeholders?
Intake
What work do you own or comes into
your scope?
What #1 - Intake
What work do you own or comes into scope?
● Remember that initial assessment, you nailed down scope,
right?
● Be DRY when gathering data (Don’t Repeat Yourself)
● Several types of work can come in:
○ Event vs Calendar
○ Ad-hoc vs Planned
● Ideally, try to limit intake - tricky politically
○ Automated intake can help with this
Triage
What resources should you use to fulfill
the goal?
What #2 - Triage
What resources should be used to fulfill the goal?
● The intake request has a goal, right?
● Bucket level of effort based on:
○ Risk / Criticality of the target
○ Automation in place
○ Accuracy of the tool
● Reduce testing scope by ‘pre-calculating’ with automation
● Keep the bucketing as simple as possible
○ No leaky abstractions with items
falling between buckets
What #2 - Triage
What resources should be used to fulfill the goal?
● Wrong choice can be better than no choice
○ You have (and should) iterate over time
● Don’t start with 100% accuracy
○ It’s great if you can pull it off but very unlikely
○ Consistent ‘stick’ to measure distance
○ Accuracy can arrive over time (if needed)
○ Avoid early optimizations
Test
What is the current security state?
What #3 - Test
What is the current security state?
● Triage showed you how much, now go test!
● Drivers of testing
○ Compliance / Regulation / Audit (internal or external)
○ Proactive testing
■ Prep for compliance, check for drift
■ Continual compliance automation
○ Updated code / new release
○ Published vulnerability
What #3 - More on Testing
What is the current security state?
Cadence considerations:
● Compliance / regulation
○ Calendar-based driven by policy or reporting requirements
● Proactive Testing
○ Calendar-based prior to reporting requirements
○ Continual is usually calendar-based too (just small)
● Update / new release
○ Event-based
○ Highly dependant on release frequency
○ Likely differs between teams
● Published Vulnerabilities
○ Event-based & Unplanned
○ Priority dictated by compensating controls
What #3 - More on Testing
What is the current security state?
Type of testing:
● Static vs Dynamic
● Source or running App
● Isolation or integration
Replicating environments in complex systems can be painful
● Microservices
● k8s native apps
What #3 - More on Testing
How far left can you go?
● Not everything to the left is “testable”
● Pick your battles, fast feedback loops are crucial
● If you “left test” one service of you 253 microservices-based
product
○ Have you really tested that product?
○ What about service to service interaction?
What #3 - More on Testing
CICD imperatives:
● Zero false positives
● Health checks vs scanning
● Specific issue tests
○ Ninja re-testing
● Long running tests vs quick tests
○ NOOP during test runs
○ Better eventually then not at all
Deliver
What addresses the needs of the
downstream stakeholders?
What #4 - Deliver
What addresses the needs of the downstream stakeholders?
● Where does your mandate stop in the finding life cycle?
○ Reporting
○ Remediation
○ Retesting
● Speak the native tongue
○ Issue trackers for devs
○ Summary data, charts & graphs for VPs and above
○ Dashboards for broader visibility
○ Engage pride as a lever
“The X team figured it out…”
Conclusion
04 Let’s wrap all this up
Putting it all together
● Understand your environment and scope
● Create your workflow / AppSec Pipeline
● Rely on constant iteration and feedback loops
● Let the system tell you rather then you tell the system
○ Continual learning via experimentation
● People (and their time) are the critical resource
○ Automate all the things
that don’t need a human brain
The 6
things of
simple machines
DevSecOps
2 Fundamental Truths
The 4 What’s
Simple Machines of DevSecOps
2 Fundamental Truths
(1) The Ground Truth
Know where your starting
(2) Single Source of Truth
A canonical representation of reality
The 4 What’s Fundamental Truths
1. Intake - What work do you own or comes into scope?
2. Triage - What resources should be used to fulfill the goal?
3. Test - What is the current security state?
4. Deliver - What addresses the needs of the downstream
stakeholders?
—Me (Matt Tesauro)
“Time to turn
chaos into calm
and
distress into success.”
CREDITS: This presentation template was
created by Slidesgo, including icons by Flaticon,
and infographics & images by Freepik.
THANKS!
Questions?
matt@defectdojo.com
matt.tesauro@owasp.org
defectdojo.com
https://www.linkedin.com/in/matttesauro/

More Related Content

Similar to Tenants for Going at DevSecOps Speed - LASCON 2023

Mozilla Foundation Metrics - presentation to engineers
Mozilla Foundation Metrics - presentation to engineersMozilla Foundation Metrics - presentation to engineers
Mozilla Foundation Metrics - presentation to engineers
John Schneider
 
Fundamentals of crowdsourced testing
Fundamentals of crowdsourced testingFundamentals of crowdsourced testing
Fundamentals of crowdsourced testing
Nicholas Roberts
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24
 
Practical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful ProgramsPractical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful Programs
Matt Tesauro
 
Improving software quality for the future of connected vehicles
Improving software quality for the future of connected vehiclesImproving software quality for the future of connected vehicles
Improving software quality for the future of connected vehicles
Devon Bleibtrey
 
Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...
DevOps.com
 
fireup pro software house - this is who we are
fireup pro software house - this is who we arefireup pro software house - this is who we are
fireup pro software house - this is who we are
fireup.pro
 
Agile practices for management
Agile practices for managementAgile practices for management
Agile practices for management
Icalia Labs
 
Software Release Orchestration and the Enterprise
Software Release Orchestration and the EnterpriseSoftware Release Orchestration and the Enterprise
Software Release Orchestration and the Enterprise
XebiaLabs
 
What Are the Basics of Product Manager Interviews by Google PM
What Are the Basics of Product Manager Interviews by Google PMWhat Are the Basics of Product Manager Interviews by Google PM
What Are the Basics of Product Manager Interviews by Google PM
Product School
 
Repertoire of contributions hacktoberfest
Repertoire of contributions hacktoberfestRepertoire of contributions hacktoberfest
Repertoire of contributions hacktoberfest
DSCVSSUT
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
RiskIQ, Inc.
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.
Matt Tesauro
 
Software Release Management: A Quick & Friendly Guide
Software Release Management: A Quick & Friendly GuideSoftware Release Management: A Quick & Friendly Guide
Software Release Management: A Quick & Friendly Guide
Enov8
 
Usa prácticas de integración continua y sobrevive para luchar otro día.
 Usa prácticas de integración continua y sobrevive para luchar otro día. Usa prácticas de integración continua y sobrevive para luchar otro día.
Usa prácticas de integración continua y sobrevive para luchar otro día.
Software Guru
 
Are we there yet? Rev up your productivity with project management tools
Are we there yet? Rev up your productivity with project management toolsAre we there yet? Rev up your productivity with project management tools
Are we there yet? Rev up your productivity with project management tools
Margot
 
Are we there yet? Rev up your productivity with project management tools
Are we there yet?  Rev up your productivity with project management toolsAre we there yet?  Rev up your productivity with project management tools
Are we there yet? Rev up your productivity with project management tools
Annis Lee Adams
 
Luiz Fernando Testa Contador - Aplicando DevOps em grandes corporações
Luiz Fernando Testa Contador - Aplicando DevOps em grandes corporaçõesLuiz Fernando Testa Contador - Aplicando DevOps em grandes corporações
Luiz Fernando Testa Contador - Aplicando DevOps em grandes corporações
Agile Trends
 
Agile and test driven development
Agile and test driven developmentAgile and test driven development
Agile and test driven development
Ahmed El-Deeb
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
jxyz
 

Similar to Tenants for Going at DevSecOps Speed - LASCON 2023 (20)

Mozilla Foundation Metrics - presentation to engineers
Mozilla Foundation Metrics - presentation to engineersMozilla Foundation Metrics - presentation to engineers
Mozilla Foundation Metrics - presentation to engineers
 
Fundamentals of crowdsourced testing
Fundamentals of crowdsourced testingFundamentals of crowdsourced testing
Fundamentals of crowdsourced testing
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
 
Practical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful ProgramsPractical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful Programs
 
Improving software quality for the future of connected vehicles
Improving software quality for the future of connected vehiclesImproving software quality for the future of connected vehicles
Improving software quality for the future of connected vehicles
 
Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...
 
fireup pro software house - this is who we are
fireup pro software house - this is who we arefireup pro software house - this is who we are
fireup pro software house - this is who we are
 
Agile practices for management
Agile practices for managementAgile practices for management
Agile practices for management
 
Software Release Orchestration and the Enterprise
Software Release Orchestration and the EnterpriseSoftware Release Orchestration and the Enterprise
Software Release Orchestration and the Enterprise
 
What Are the Basics of Product Manager Interviews by Google PM
What Are the Basics of Product Manager Interviews by Google PMWhat Are the Basics of Product Manager Interviews by Google PM
What Are the Basics of Product Manager Interviews by Google PM
 
Repertoire of contributions hacktoberfest
Repertoire of contributions hacktoberfestRepertoire of contributions hacktoberfest
Repertoire of contributions hacktoberfest
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.
 
Software Release Management: A Quick & Friendly Guide
Software Release Management: A Quick & Friendly GuideSoftware Release Management: A Quick & Friendly Guide
Software Release Management: A Quick & Friendly Guide
 
Usa prácticas de integración continua y sobrevive para luchar otro día.
 Usa prácticas de integración continua y sobrevive para luchar otro día. Usa prácticas de integración continua y sobrevive para luchar otro día.
Usa prácticas de integración continua y sobrevive para luchar otro día.
 
Are we there yet? Rev up your productivity with project management tools
Are we there yet? Rev up your productivity with project management toolsAre we there yet? Rev up your productivity with project management tools
Are we there yet? Rev up your productivity with project management tools
 
Are we there yet? Rev up your productivity with project management tools
Are we there yet?  Rev up your productivity with project management toolsAre we there yet?  Rev up your productivity with project management tools
Are we there yet? Rev up your productivity with project management tools
 
Luiz Fernando Testa Contador - Aplicando DevOps em grandes corporações
Luiz Fernando Testa Contador - Aplicando DevOps em grandes corporaçõesLuiz Fernando Testa Contador - Aplicando DevOps em grandes corporações
Luiz Fernando Testa Contador - Aplicando DevOps em grandes corporações
 
Agile and test driven development
Agile and test driven developmentAgile and test driven development
Agile and test driven development
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
 

More from Matt Tesauro

Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfHacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
Matt Tesauro
 
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API VulnerabilitiesBlack and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Matt Tesauro
 
Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API Landscape
Matt Tesauro
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
Matt Tesauro
 
Intro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandIntro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP Switzerland
Matt Tesauro
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into security
Matt Tesauro
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's Reach
Matt Tesauro
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
Matt Tesauro
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with Scissors
Matt Tesauro
 
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Matt Tesauro
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program
Matt Tesauro
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based Security
Matt Tesauro
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
Matt Tesauro
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016
Matt Tesauro
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Matt Tesauro
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015
Matt Tesauro
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Matt Tesauro
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
Matt Tesauro
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt Tesauro
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Matt Tesauro
 

More from Matt Tesauro (20)

Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfHacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
 
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API VulnerabilitiesBlack and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
 
Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API Landscape
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
 
Intro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP SwitzerlandIntro to DefectDojo at OWASP Switzerland
Intro to DefectDojo at OWASP Switzerland
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into security
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's Reach
 
OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with Scissors
 
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based Security
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
 
Lessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec LifeLessons from DevOps: Taking DevOps practices into your AppSec Life
Lessons from DevOps: Taking DevOps practices into your AppSec Life
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Tenants for Going at DevSecOps Speed - LASCON 2023

  • 1. Tenants for Going at DevSecOps Speed matt@defectdojo.com matt.tesauro@owasp.org https://www.linkedin.com/in/matttesauro/ Matt Tesauro
  • 2. Who is this guy? ● Reformed programmer & AppSec Engineer ● CTO & Founder of DefectDojo Inc ● 15+ years in the OWASP community ○ OWASP DefectDojo (core maintainer) ○ OWASP Podcast (host) ○ OWASP Global Board of Directors ○ OWASP AppSec Pipeline (co-leader) ○ OWASP WTE (leader) ● 22+ years using FLOSS and Linux ● Go language fanboy ● Ee Dan in Tang Soo Do (2nd degree black belt)
  • 4. Overview 01 Let’s start at the beginning
  • 5. —Me (Matt Tesauro) “Time to turn chaos into calm and distress into success.”
  • 6. Background This talk was created from the perspective that: ● You’ve been dropped into a AppSec / DevSecOps / Product Security team as it’s lead ● You need to “do AppSec” ● You have a limited team and budget ● You need: “A simple system that adapts to complex situations”
  • 7. The 6 things of DevSecOps 2 Fundamental Truths The 4 What’s
  • 8. Simple Machines Definition: “Any of several devices which few or no moving parts that are used to modify motion and magnitude of a force in order to perform work.” ● The inclined plane ● The lever ● The wedge ● The wheel and axle ● The pulley ● The screw Combine these to make complex machines
  • 10. Let’s Define the ‘Simple Machines’ of DevSecOps You can then mix and match them to fit the context in which you work.
  • 11. The 6 things of simple machines DevSecOps 2 Fundamental Truths The 4 What’s
  • 12. 2 Fundamental Truths 02 The two things the rest depend on
  • 13. The Ground Truth Know where you’re starting from The initial assessment
  • 14. The Ground Truth Know where you’re starting from ● Initial broad assessment ● Why? ○ Demonstrate progress ● Measure when you start and regularly re-measure ○ Can’t measure change till the 2nd measurement ○ Get an early measurement to show progress early
  • 15. What the assessment will find ● Ranges from greenfield to scorched earth ● Nothing exists to a complete, validated list of all apps within the company ● SaaS company with a single product ○ Warning “Product” is a charged term ○ Product != repo ○ Microservices, Web and Mobile versions, …
  • 16. What is a Product? ● You need to figure out what this means in context ● Stick to the definition you established ● Maybe make a poster out of it ● Avoids incredible amounts of future confusion and misunderstanding ● Product X was assessed versus A repo that is one of the 6 repos that makes up Product X was assessed
  • 17. Understand the scope of your work ● Hopefully covered clearly before you were hired ● There’s no standard ○ Write it down / define it ○ Another poster? ● Apps only, App and Infra, Containers, Cloud, … ● How much of the vulnerability lifecycle do you own? ○ Reporting, Mitigation, Remediation, Retesting? ● Who are your upstream & downstream stakeholders?
  • 18. Where to get started? There’s some good frameworks you can use to do an initial assessment, but first: ● Decide how much time to spend ● Accuracy vs speed ● Iterative is the thing ● Solo vs collaborative Things to use as a guide: ● OWASP SAMM (Software Assurance Maturity Model) ● OWASP ASVS (Application Security Verification Standard) ● OWASP DSOMM (DevSecOps Maturity Model)
  • 19. Single Source of Truth As you move forward, you need a canonical representation of reality
  • 20. Canonical Representation of Reality ● It’s very likely you won’t have a full picture ● You need something that adapts and grows over time ● Tool venders will have you log into 27 web consoles ● How to pick a single source of truth? ○ Ability to hold all the data you need flexibly ○ Ability to filter, sort, modify, combine the data ○ Differing views based on stakeholders ○ Dedup, False Positives, Grouping/Merging
  • 21. I know what you’re thinking.. Current tool for 90% of Enterprise Vulnerability Management Programs
  • 24. Comes in 2 flavors: OWASP DefectDojo
  • 25. Comes in 2 flavors: DefectDojo Pro (SaaS)
  • 27. DefectDojo - a single source of truth DevSecOps tool created by DevSecOps professionals for DevSecOps professionals. ● Manages the DevSecOps security program ● Application inventory with robust metadata ● Sort, filter, munge and export the data in multiple ways ● Engagement / assessment tracking ● Supports manual and automated security work ● Deduplication + false positive tracking of findings ● Custom report creation ● Tagging on multiple levels ● Calendar of security activities ● Historical knowledge of past assessments
  • 28. Why was DefectDojo created? DefectDojo was born from the frustrations of the product security team at Rackspace with: ● Tracking manual testing efforts ● Combining output from multiple tools ● Tools having a snowflake way to represent issues ● De-duping and merging/grouping findings ● False-positive management ● Reporting on infra & app issues ● Logging into N vendor motherships ● The need to automate (REST API)
  • 29. Active project with large community Monthly release (2.x.0) Bugfix release every week in between (2.x.y)
  • 30. Commercial Support is available https://www.defectdojo.com/
  • 31. Where to get more info? Search Youtube for “purple DefectDojo”
  • 32. The 4 What’s 03 What needs to happen for DevSecOps
  • 34.
  • 35.
  • 36.
  • 37. The 4 What’s Intake What work do you own or comes into scope? Triage What resources should be used to fulfill the goal? Test What is the current security state? Deliver What addresses the needs of the downstream stakeholders?
  • 38. Intake What work do you own or comes into your scope?
  • 39. What #1 - Intake What work do you own or comes into scope? ● Remember that initial assessment, you nailed down scope, right? ● Be DRY when gathering data (Don’t Repeat Yourself) ● Several types of work can come in: ○ Event vs Calendar ○ Ad-hoc vs Planned ● Ideally, try to limit intake - tricky politically ○ Automated intake can help with this
  • 40. Triage What resources should you use to fulfill the goal?
  • 41. What #2 - Triage What resources should be used to fulfill the goal? ● The intake request has a goal, right? ● Bucket level of effort based on: ○ Risk / Criticality of the target ○ Automation in place ○ Accuracy of the tool ● Reduce testing scope by ‘pre-calculating’ with automation ● Keep the bucketing as simple as possible ○ No leaky abstractions with items falling between buckets
  • 42. What #2 - Triage What resources should be used to fulfill the goal? ● Wrong choice can be better than no choice ○ You have (and should) iterate over time ● Don’t start with 100% accuracy ○ It’s great if you can pull it off but very unlikely ○ Consistent ‘stick’ to measure distance ○ Accuracy can arrive over time (if needed) ○ Avoid early optimizations
  • 43. Test What is the current security state?
  • 44. What #3 - Test What is the current security state? ● Triage showed you how much, now go test! ● Drivers of testing ○ Compliance / Regulation / Audit (internal or external) ○ Proactive testing ■ Prep for compliance, check for drift ■ Continual compliance automation ○ Updated code / new release ○ Published vulnerability
  • 45. What #3 - More on Testing What is the current security state? Cadence considerations: ● Compliance / regulation ○ Calendar-based driven by policy or reporting requirements ● Proactive Testing ○ Calendar-based prior to reporting requirements ○ Continual is usually calendar-based too (just small) ● Update / new release ○ Event-based ○ Highly dependant on release frequency ○ Likely differs between teams ● Published Vulnerabilities ○ Event-based & Unplanned ○ Priority dictated by compensating controls
  • 46. What #3 - More on Testing What is the current security state? Type of testing: ● Static vs Dynamic ● Source or running App ● Isolation or integration Replicating environments in complex systems can be painful ● Microservices ● k8s native apps
  • 47. What #3 - More on Testing How far left can you go? ● Not everything to the left is “testable” ● Pick your battles, fast feedback loops are crucial ● If you “left test” one service of you 253 microservices-based product ○ Have you really tested that product? ○ What about service to service interaction?
  • 48. What #3 - More on Testing CICD imperatives: ● Zero false positives ● Health checks vs scanning ● Specific issue tests ○ Ninja re-testing ● Long running tests vs quick tests ○ NOOP during test runs ○ Better eventually then not at all
  • 49. Deliver What addresses the needs of the downstream stakeholders?
  • 50. What #4 - Deliver What addresses the needs of the downstream stakeholders? ● Where does your mandate stop in the finding life cycle? ○ Reporting ○ Remediation ○ Retesting ● Speak the native tongue ○ Issue trackers for devs ○ Summary data, charts & graphs for VPs and above ○ Dashboards for broader visibility ○ Engage pride as a lever “The X team figured it out…”
  • 52. Putting it all together ● Understand your environment and scope ● Create your workflow / AppSec Pipeline ● Rely on constant iteration and feedback loops ● Let the system tell you rather then you tell the system ○ Continual learning via experimentation ● People (and their time) are the critical resource ○ Automate all the things that don’t need a human brain
  • 53. The 6 things of simple machines DevSecOps 2 Fundamental Truths The 4 What’s
  • 54. Simple Machines of DevSecOps 2 Fundamental Truths (1) The Ground Truth Know where your starting (2) Single Source of Truth A canonical representation of reality The 4 What’s Fundamental Truths 1. Intake - What work do you own or comes into scope? 2. Triage - What resources should be used to fulfill the goal? 3. Test - What is the current security state? 4. Deliver - What addresses the needs of the downstream stakeholders?
  • 55. —Me (Matt Tesauro) “Time to turn chaos into calm and distress into success.”
  • 56. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik. THANKS! Questions? matt@defectdojo.com matt.tesauro@owasp.org defectdojo.com https://www.linkedin.com/in/matttesauro/