SlideShare a Scribd company logo
1 of 27
Tools to create a secure build pipeline
Bruno Bossola
@bbossola
About me
● Developer 1988+
● XP coach 2000+
● Co-founder Jug Torino
@bbossola
Agenda
● Why do we need a security pipeline?
● Security tools: SAST, DAST, RASP, IAST
● Workshops: a closer look to the tools
● Q&A
@bbossola
Why should we build a security pipeline?
@bbossola
Fixing problems early
● a security problem is a bug
● the late we fix a bug,
the more costly it is
● the cost of a bug
found in production is 30
times more expensive!
● Recalling cars anyone?
Minimizing Code Defects to Improve Software Quality and Lower Development Costs. IBM, 2008
@bbossola
Isn't this just an insurance policy?
● Well, in a sense. What about...
yup, sometimes is more expensive than 30 times!
@bbossola
If cars were built like applications...
“Cars would have no airbags, mirrors, seat belts, doors,
roll-bars, side-impact bars, or locks, because no-one had
asked for them. But they would all have at least six cup
holders.”
The OWASP foundation - “Integration into the SDLC”
@bbossola
If cars were built like applications...
“Many safety features originally included might be removed
before the car was completed, because they might
adversely impact performance.”
The OWASP foundation - “Integration into the SDLC”
@bbossola
If cars were built like applications...
“A MOT inspection would consist of counting the wheels
and making recommendations on wheel quantity.”
The OWASP foundation - “Integration into the SDLC”
@bbossola
The SDLC process
Requirements
Design
Coding
Testing
Evaluation
LIVE
Planning
@bbossola
Security tools
@bbossola
The families of security tools
Requirements
Design
Coding
Testing
Evaluation
LIVE
Planning
SAST
IAST
DAST
RASP
Security, please!
@bbossola
SAST tools
● Static Application Security Testing
● Tools that statically analyse the code base to find security
flaws
● Either source code or compiled code
● Three families:
– Static Code Analysis
– Static Dependency Analysis (or Static Component Analysis)
– Sensitive Information Scanners
@bbossola
SAST sub-families
● Static Code Analysis
– Analysis of the sources or the binaries
@bbossola
SAST sub-families
● Static Code Analysis
– Analysis of the sources or the binaries
● Static Dependency Analysis (or Static Component Analysis)
– 20% of the code is your code
– 80% of code comes from external libraries
● better check it, yeah?
WARNING!!!
SHAMELESS
PLUG
HERE!
@bbossola
SAST sub-families
● Static Code Analysis
– Analysis of the sources or the binaries
● Static Dependency Analysis (or Static Component Analysis)
– 20% of the code is your code
– 80% of code comes from external libraries
● Sensitive Information Scanners
– Any AWS key committed in your repo?
– What about the commit comments?
@bbossola
DAST tools
● Dynamic Application Security Testing
● Testing an application in an operating state
– uses fault injection techniques
– automated black box testing
● Interacts with exposed interfaces
– HTML
– APIs
– Other specific protocols
@bbossola
RASP tools
● Run-time Application Self-Protection
● an agent is embedded into the application
– usually “melted” through code instrumentation
● it analyses the application behaviour
● a RASP can:
– shutdown a user session
– stop executing the application
– deploy code fixes at runtime
– provide detailed reports and runtime monitoring
@bbossola
IAST tools
● Interactive Application Security Testing
● As RASP they embed an agent in the application
● However they are not used in production
● It's a testing tool, not a security tool
@bbossola
Anything else?
● WAF – Web Application Firewalls
– a perimeter control solution
– basicallly a reverse proxy
– applies a set of rules to an HTTP conversation
– cover common attacks such as cross-site scripting (XSS) and
SQL injection
@bbossola
Commercial options
@bbossola
Workshop time!
● Get your computer
● Make sure your internet
connection works :)
@bbossola
A closer look to SAST tools
● Static Code Analysis
– PMD
– Spotbugs
– Errorprone
@bbossola
A closer look to SAST tools
● Static Dependency Analysis (or Static Component Analysis)
– dependency-check
– meterian
WARNING!!!
SHAMELESS
PLUG
HERE!
@bbossola
A closer look to SAST tools
● Sensitive Information Scanners
– gitleaks
– trufflehog
● Mentioned:
– git-secrets
– gitrob
@bbossola
A closer look to a RASP tool
● An opensource RASP tool
– OpenRASP
@bbossola
Q&A

More Related Content

Recently uploaded

Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
Max Lee
 

Recently uploaded (20)

Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
CompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdfCompTIA Security+ (Study Notes) for cs.pdf
CompTIA Security+ (Study Notes) for cs.pdf
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Tools to create a secure pipeline

  • 1. Tools to create a secure build pipeline Bruno Bossola
  • 2. @bbossola About me ● Developer 1988+ ● XP coach 2000+ ● Co-founder Jug Torino
  • 3. @bbossola Agenda ● Why do we need a security pipeline? ● Security tools: SAST, DAST, RASP, IAST ● Workshops: a closer look to the tools ● Q&A
  • 4. @bbossola Why should we build a security pipeline?
  • 5. @bbossola Fixing problems early ● a security problem is a bug ● the late we fix a bug, the more costly it is ● the cost of a bug found in production is 30 times more expensive! ● Recalling cars anyone? Minimizing Code Defects to Improve Software Quality and Lower Development Costs. IBM, 2008
  • 6. @bbossola Isn't this just an insurance policy? ● Well, in a sense. What about... yup, sometimes is more expensive than 30 times!
  • 7. @bbossola If cars were built like applications... “Cars would have no airbags, mirrors, seat belts, doors, roll-bars, side-impact bars, or locks, because no-one had asked for them. But they would all have at least six cup holders.” The OWASP foundation - “Integration into the SDLC”
  • 8. @bbossola If cars were built like applications... “Many safety features originally included might be removed before the car was completed, because they might adversely impact performance.” The OWASP foundation - “Integration into the SDLC”
  • 9. @bbossola If cars were built like applications... “A MOT inspection would consist of counting the wheels and making recommendations on wheel quantity.” The OWASP foundation - “Integration into the SDLC”
  • 12. @bbossola The families of security tools Requirements Design Coding Testing Evaluation LIVE Planning SAST IAST DAST RASP Security, please!
  • 13. @bbossola SAST tools ● Static Application Security Testing ● Tools that statically analyse the code base to find security flaws ● Either source code or compiled code ● Three families: – Static Code Analysis – Static Dependency Analysis (or Static Component Analysis) – Sensitive Information Scanners
  • 14. @bbossola SAST sub-families ● Static Code Analysis – Analysis of the sources or the binaries
  • 15. @bbossola SAST sub-families ● Static Code Analysis – Analysis of the sources or the binaries ● Static Dependency Analysis (or Static Component Analysis) – 20% of the code is your code – 80% of code comes from external libraries ● better check it, yeah? WARNING!!! SHAMELESS PLUG HERE!
  • 16. @bbossola SAST sub-families ● Static Code Analysis – Analysis of the sources or the binaries ● Static Dependency Analysis (or Static Component Analysis) – 20% of the code is your code – 80% of code comes from external libraries ● Sensitive Information Scanners – Any AWS key committed in your repo? – What about the commit comments?
  • 17. @bbossola DAST tools ● Dynamic Application Security Testing ● Testing an application in an operating state – uses fault injection techniques – automated black box testing ● Interacts with exposed interfaces – HTML – APIs – Other specific protocols
  • 18. @bbossola RASP tools ● Run-time Application Self-Protection ● an agent is embedded into the application – usually “melted” through code instrumentation ● it analyses the application behaviour ● a RASP can: – shutdown a user session – stop executing the application – deploy code fixes at runtime – provide detailed reports and runtime monitoring
  • 19. @bbossola IAST tools ● Interactive Application Security Testing ● As RASP they embed an agent in the application ● However they are not used in production ● It's a testing tool, not a security tool
  • 20. @bbossola Anything else? ● WAF – Web Application Firewalls – a perimeter control solution – basicallly a reverse proxy – applies a set of rules to an HTTP conversation – cover common attacks such as cross-site scripting (XSS) and SQL injection
  • 22. @bbossola Workshop time! ● Get your computer ● Make sure your internet connection works :)
  • 23. @bbossola A closer look to SAST tools ● Static Code Analysis – PMD – Spotbugs – Errorprone
  • 24. @bbossola A closer look to SAST tools ● Static Dependency Analysis (or Static Component Analysis) – dependency-check – meterian WARNING!!! SHAMELESS PLUG HERE!
  • 25. @bbossola A closer look to SAST tools ● Sensitive Information Scanners – gitleaks – trufflehog ● Mentioned: – git-secrets – gitrob
  • 26. @bbossola A closer look to a RASP tool ● An opensource RASP tool – OpenRASP

Editor's Notes

  1. Introduce meterian clearly“we help companies to ship software without vulnerabilities” startup, I am a cofounder with Vivian (PM)
  2. Let's look at a simple SQL injection example. A naive application simply has no defense and gets exploited. An application that uses PreparedStatements is safe against injection, but has no idea whether it is being attacked or not. Let's see how this works with RASP. I'm describing Contrast's instrumentation approach here. First, the RASP is installed into the application. In this case, simply adding the RASP agent to the environment is enough. When the code loads, the RASP uses dynamic binary instrumentation to add new security sensors and analysis capability to the application. When the attack arrives at the application, RASP uses gathers data about the request, the user, the session, and any other contextual information. The attacker's request data is tracked through the application. If it looks like an attack, but never reaches a SQL query, it gets reported as a probe. This is a major difference from what a WAF can do, as WAFs are not able to see what happens inside the application and must overblock. If the attack actually reaches a SQL query and modifies the meaning of that query, only then does RASP block the attack. This is essentially enforcing the definition of SQL Injection, as only attacks that successfully modify the meaning of SQL queries are blocked. This is why RASP implementation can be deployed without much configuration or training