SlideShare a Scribd company logo
Web Application security
for continuous delivery
pipelines
Christian Treutler, Avi Networks
AppSec DefenderEngineer at heart
Christian Treutler
Interested in
(sometimes scared by)
Security Automation,
IoT security, Big Data
security, AI security
implications.
Security evangelist
Agenda
1. Mission statement
2. CICD Introduction
3. Demo: Rolling out a new version
4. How to build application security into a CICD
pipeline from a WAF perspective?
5. Demo: Pipeline with enabled WAF
6. Demo: Security with ”infra as code”
Mission Statement:
Including AppSec into CICD environments
can be achieved with the right tools.
Teams must work together closely to allow this kind of automation to succeed.
Continuous Delivery Introduction
“Continuous Delivery is a software development discipline where you build software in such a way that the software can be
released to production at any time.” – Martin Fowler
“Our goal is to make deployments—whether of a large-scale distributed system, a complex production environment, an
embedded system, or an app—predictable, routine affairs that can be performed on demand.” - Jez Humble
Continuous Delivery involves automation and integration of all stages of software
development including – development, build, test, acceptance, configuration management,
infrastructure, provisioning and ultimately release!
Running a successful CICD
The very short version. For detailed information, please see references at the end of the slide deck.
Goals
Predictable, reliable, fast and better quality!
Business – Sales, PM and Customers love this!
Operations
Organizational
Success metrics
How to express the Pass / Fail decision?
Use Normalized metrics
Metrics measuring Quality is more important than Quantity
Benchmark your application!
Process Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
Feedback delay
as small as
possible
Deployment
Application config
as code
Check
Apply
Updates
Validate &
Record
Continuous
Integration
Software Build
Integration
Tests
Sandbox Production
Deployment Automation
Demo Setup
Environment Walkthrough
Demo Environment
Application: vulnerable application Hackazon
Application lifecycle includes security scanning and iWAF Protection
All parts use “infrastructure as code”
Kubernetes: a cluster of 3 nodes + dashboard
Service Mesh: Avi with iWAF module
CICD: Concourse
Gitea: local GIT repository
Docker registry
OWASP ZAP scanner
All services run on Kubernetes in Docker containers
BARE METAL VIRTUALIZED CONTAINERSON PREMISES PUBLIC CLOUDVIRTUALIZED CONTAINERS
Modern, Scalable, Multi-Cloud Architecture
CONTROLLER
(SaaS / Self-Managed)
SERVICE
ENGINE
SEPARATE CONTROL
& DATA PLANE
ELASTICITY
INTELLIGENCE AUTOMATIONMULTI-CLOUD
Copyright © 2018 Avi Networks
K8S Node
K8S Master
DC: app1
K8S Node
Pod 4Pod 3
K8S Node
Pod 2Pod 1
K8S Node
Avi Controller Avi Service
Engine
Proxy Functions:
• Full-Featured Service Proxy (Distributed Load Balancing: L4-7)
• Service Discovery (DNS, IPAM)
• App Maps, Service Performance Monitoring, Connection log
search and analytics
• Security Rules, Web App Firewall, and Traffic Encryption
• Application Auto-Scaling
Avi’s Container Services for OpenShift/Kubernetes
Distributed Proxy for both North-South (Ingress) and East-West Traffic
Demo 1
CICD in an application security context
CICD in an application security context
Which parts of AppSec can be applied?
DAST, SAST, Vulnerability management
(Black and white box testing)
Trusted solutions
Usually automatable in test/staging through APIs
Success metric: vulnerabilities within expected numbers
Misc.
DDoS Protection – part of ADC/LB requirements
Transport Security – TLS encryption – ADC
Virus/Malware scanning – application or agent based
Success metric: depends on requirements
RASP
Runtime Application Self-Protection
Built into the application / tool chain
Essentially part of the application
Success metric: application test is green
WAF
Application protection (usually proxy based)
WAF policy needs to be part of application or infra code
Must deployed in all environments (dev, test ,production)
Success metric: application test is green
Challenges of AppSec vs Dev
High level view
Infrastructure does not support
security requirements
Vendor/product X does not support security
requirement foo.
Security is a first class feature
Should be part of company DNA
Security education
Every employee needs to be educated about the
implications if security best practices are not met.
Features vs. Security
When planned and designed correctly security is
part of a feature and not something that competes
for the same resources.
Team Silos
Security is a team effort and will fail it not all
teams take their share of the responsibility.
Demo 2
Designing a CICD pipeline with Web Application Firewall
Legacy WAF challenges with CICD
Elasticity, Scalability, Programmability, Automation, Management as code
PROPRIETARY
HARDWARE
Costly Refresh Cycle
Tied to Environment
MANAGE EACH DEVICE
No central management
No central monitoring
NO AUTOMATION
Incomplete REST API
No plug-n-play automation
NO TELEMETRY
LBs are black boxes
No analytics or insights
STATIC CAPACITY
Requires overprovisioning
No cloud like elasticity
CICD example: WAF – properties for a working solution
An overview
Mindset
• Application developer, security networking all work together
• Application developer accepts WAF as a additional security layer to protect the application
• Application developer uses WAF analytics for application behavior analysis
• Security team defines security requirements and risk assessments
• Security team provides oversight and guidance
Infrastructure
• Pure software solution that supports deployment anywhere with the application
• Integration into a Load Balancer or Web Server
• Automation (APIs, SDK, integrations)
• Orchestration integration (Cloud, Container, Scalable)
• Insights, metrics
Process
• WAF is part of all stages of the development process
• WAF policy is owned by application developer and kept with the application source code
• WAF policy changes are tracked within the source code repository with ticket management
• Security audit process: security team can monitor and approve policy changes if needed (pull requests)
• Every application uses the default security policy (for that specific application type, risk profile)
CICD workflow with WAF – development
Sample integration of a WAF into a CICD workflow:
Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
Develop
WAF is part of the development process.
If needed WAF policy is updated by the developer.
Security team approves the changes to the WAF
policy.
WAF policy is part of the application code and will
be rolled out with application build.
CICD workflow with WAF – build
Sample integration of a WAF into a CICD workflow:
Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
Build
WAF has no part in the build process, since it does
not directly influence the application code.
CICD workflow with WAF – test
Sample integration of a WAF into a CICD workflow:
Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
Test
All tests are run with the new build.
Test environment uses stored WAF policy.
Any test failures or unexpected WAF findings can
trigger a new ticket for the developer to investigate
and fix.
Tests include unit, functional and ideally end-to-
end tests.
Caveat: Simulated test traffic is usually inferior to
real world traffic.
CICD workflow with WAF – deploy
Sample integration of a WAF into a CICD workflow:
Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
Deploy
WAF gets deployed alongside application code.
CICD workflow with WAF – monitor / validate
Sample integration of a WAF into a CICD workflow:
Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
Monitor / Validate
WAF metrics will provide necessary insight into the
health and expected WAF behavior to measure.
CICD workflow with WAF – in-service / out-of-service
Sample integration of a WAF into a CICD workflow:
Develop
Build
Test
Deploy
Monitor /
Validate
In-Service /
Out-of-service
In-Service / Out-of-service
According to the success criteria the new
application code is put in-service and the old
application code is taken out-of-service.
WAF metrics can have a direct impact on the cut
over if they degrade. It is one part of the success
criteria.
Demo 3
Security with ”infrastructure as code”
●1. Continuous Delivery transcends technical, cultural,
process and business aspects of any team.
●2. Deployment decisions can be automated –
provided metrics are wisely used.
●3. If possible make your applications elastic and set
it up such that it can scale-out and scale-in during the
deployment evaluation.
●4. Modern tools for CI, configuration management,
deployment pipeline automation, ONF (SDN), public
and private cloud programmability allows complex
applications to be easily deployed.
●1. As Continuous Delivery is introduced the security
strategy of a company is a key factor for success.
●2. Application security process is required.
●3. Any WAFs that supports the infrastructure
requirements can be used for CICD.
●4. A WAF needs to provide metrics (via API) for
evaluation of successful deployment and operations.
●5. Change management is crucial and auditing must be
possible (trace of configuration changes).
Summary: Continuous Delivery with and without Application Security focus
Thank You!
Christian Treutler, Avi Networks
christian@avinetworks.com
Next Steps
1. Learn about GDPR and WAF
https://info.avinetworks.com/webinars/secure-web-
applications-and-achieve-compliance
2. Schedule a demo
https://info.avinetworks.com/schedule-a-demo
3. Get your hands “dirty”
https://github.com/avinetworks/devops/tree/master/an
sible/deployment_pipeline
References
Jez Humble, https://continuousdelivery.com
Martin Fowler, https://martinfowler.com/delivery.html
Chen, Lianping, Paddy Power. Continuous Delivery: Huge Benefits, but Challenges Too. IEEE Software. 32.
10.1109/MS.2015.27
Demo code is available at github
Download Avi Solution from www.avinetworks.com
https://github.com/avinetworks/devops/tree/master/ansible/deployment_pipeline

More Related Content

What's hot

Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Novell
 
Best Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and ApplicationsBest Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and Applications
Prolifics
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
eG Innovations
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
Riverbed Technology
 
How Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual AssistantHow Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual Assistant
eG Innovations
 
Deep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesDeep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application Services
Avi Networks
 
Bringing SaaS Simplicity to Proactive Support & Live Threat Updates
Bringing SaaS Simplicity to Proactive Support & Live Threat UpdatesBringing SaaS Simplicity to Proactive Support & Live Threat Updates
Bringing SaaS Simplicity to Proactive Support & Live Threat Updates
Avi Networks
 
F5 Application Delivery Optimization
F5 Application Delivery OptimizationF5 Application Delivery Optimization
F5 Application Delivery Optimization
F5 Networks
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
Farooq Khan
 
Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...
Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...
Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...
Avi Networks
 
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Avi Networks
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
Amazon Web Services
 
7 Requirements for Modern Load Balancers
7 Requirements for Modern Load Balancers7 Requirements for Modern Load Balancers
7 Requirements for Modern Load Balancers
Avi Networks
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENDaron Walker
 
Cloud With DevOps Enabling Rapid Business Development
Cloud With DevOps Enabling Rapid Business DevelopmentCloud With DevOps Enabling Rapid Business Development
Cloud With DevOps Enabling Rapid Business Development
Sam Garforth
 
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An Island
VMworld
 
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance ProblemsExposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance Problems
Riverbed Technology
 
How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...
eG Innovations
 

What's hot (20)

Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management SolutionsVirtual Desktop Infrastructure with Novell Endpoint Management Solutions
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
 
Best Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and ApplicationsBest Practices for Monitoring Your Cloud Environment and Applications
Best Practices for Monitoring Your Cloud Environment and Applications
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
 
Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?Suffering from “Franken” Monitoring?
Suffering from “Franken” Monitoring?
 
How Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual AssistantHow Citrix Admins can get a Virtual Assistant
How Citrix Admins can get a Virtual Assistant
 
Deep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application ServicesDeep Automation and ML-Driven Analytics for Application Services
Deep Automation and ML-Driven Analytics for Application Services
 
Bringing SaaS Simplicity to Proactive Support & Live Threat Updates
Bringing SaaS Simplicity to Proactive Support & Live Threat UpdatesBringing SaaS Simplicity to Proactive Support & Live Threat Updates
Bringing SaaS Simplicity to Proactive Support & Live Threat Updates
 
F5 Application Delivery Optimization
F5 Application Delivery OptimizationF5 Application Delivery Optimization
F5 Application Delivery Optimization
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
 
Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...
Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...
Securing Web Applications with Deep Automation with VMware NSX Advanced Load ...
 
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
Deliver Modern Applications with an Elastic Load Balancing Fabric Powered by ...
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
 
7 Requirements for Modern Load Balancers
7 Requirements for Modern Load Balancers7 Requirements for Modern Load Balancers
7 Requirements for Modern Load Balancers
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
Cloud With DevOps Enabling Rapid Business Development
Cloud With DevOps Enabling Rapid Business DevelopmentCloud With DevOps Enabling Rapid Business Development
Cloud With DevOps Enabling Rapid Business Development
 
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
VMworld 2013: VMware and Puppet: How to Plan, Deploy & Manage Modern Applicat...
 
VMworld 2015: No App is An Island
VMworld 2015: No App is An IslandVMworld 2015: No App is An Island
VMworld 2015: No App is An Island
 
Exposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance ProblemsExposing and Fixing Common App Performance Problems
Exposing and Fixing Common App Performance Problems
 
How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...
 

Similar to Web Application Security for Continuous Delivery Pipelines

Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
NGINX, Inc.
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud
tCell
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
Mykhailo Antonishyn
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
Brian Levine
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
NGINX, Inc.
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
Tom Laszewski
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
Abhay Bhargav
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
Spv Reddy
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
Anna Royzman
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Amazon Web Services
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Alert Logic
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
VMware Tanzu
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
DevOps for Enterprise Systems
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Deborah Schalm
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
DevOps.com
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Arun Prabhakar
 

Similar to Web Application Security for Continuous Delivery Pipelines (20)

Easily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINXEasily View, Manage, and Scale Your App Security with F5 NGINX
Easily View, Manage, and Scale Your App Security with F5 NGINX
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud5 Challenges of Moving Applications to the Cloud
5 Challenges of Moving Applications to the Cloud
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Inherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV DeploymentsInherent Security Design Patterns for SDN/NFV Deployments
Inherent Security Design Patterns for SDN/NFV Deployments
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
Shift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINXShift Left for More Secure Apps with F5 NGINX
Shift Left for More Secure Apps with F5 NGINX
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
DevSecOps
DevSecOpsDevSecOps
DevSecOps
 
Sumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing FrameworkSumeet Mandloi: Robust Security Testing Framework
Sumeet Mandloi: Robust Security Testing Framework
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 

More from Avi Networks

DR On Demand At Fraction of the Cost (1).pptx
DR On Demand At Fraction of the Cost (1).pptxDR On Demand At Fraction of the Cost (1).pptx
DR On Demand At Fraction of the Cost (1).pptx
Avi Networks
 
Cloud_controllers_public_webinar_aug31_v1.pptx
Cloud_controllers_public_webinar_aug31_v1.pptxCloud_controllers_public_webinar_aug31_v1.pptx
Cloud_controllers_public_webinar_aug31_v1.pptx
Avi Networks
 
Top 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load Balancer
Top 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load BalancerTop 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load Balancer
Top 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load Balancer
Avi Networks
 
23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx
23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx
23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx
Avi Networks
 
Enterprises-Have-Replaced-12000-ADCs-See-Why.pptx
Enterprises-Have-Replaced-12000-ADCs-See-Why.pptxEnterprises-Have-Replaced-12000-ADCs-See-Why.pptx
Enterprises-Have-Replaced-12000-ADCs-See-Why.pptx
Avi Networks
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
Avi Networks
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Avi Networks
 
Deploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingDeploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load Balancing
Avi Networks
 
NSX_Advanced_Load_Balancer_Solution_with_Oracle.pptx
NSX_Advanced_Load_Balancer_Solution_with_Oracle.pptxNSX_Advanced_Load_Balancer_Solution_with_Oracle.pptx
NSX_Advanced_Load_Balancer_Solution_with_Oracle.pptx
Avi Networks
 
Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation
Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation
Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation
Avi Networks
 
Avi workshop-101
Avi workshop-101Avi workshop-101
Avi workshop-101
Avi Networks
 
Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI
Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI
Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI
Avi Networks
 
Deploying Elastic, Self-Service Load Balancing for VMware NSX-T
Deploying Elastic, Self-Service Load Balancing for VMware NSX-TDeploying Elastic, Self-Service Load Balancing for VMware NSX-T
Deploying Elastic, Self-Service Load Balancing for VMware NSX-T
Avi Networks
 
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load BalancingAvi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
Avi Networks
 
Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)
Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)
Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)
Avi Networks
 
Multi Cloud Load Balancing 101 and Hands On Lab
Multi Cloud Load Balancing 101 and Hands On LabMulti Cloud Load Balancing 101 and Hands On Lab
Multi Cloud Load Balancing 101 and Hands On Lab
Avi Networks
 
Multi Cloud Load balancing 101 and Hands-on Lab
Multi Cloud Load balancing 101 and Hands-on LabMulti Cloud Load balancing 101 and Hands-on Lab
Multi Cloud Load balancing 101 and Hands-on Lab
Avi Networks
 
Multi-Cloud Load Balancing 101 and Hands-On Lab
Multi-Cloud Load Balancing 101 and Hands-On LabMulti-Cloud Load Balancing 101 and Hands-On Lab
Multi-Cloud Load Balancing 101 and Hands-On Lab
Avi Networks
 
Enabling Remote Employees with Horizon VDI and Avi Networks
Enabling Remote Employees with Horizon VDI and Avi NetworksEnabling Remote Employees with Horizon VDI and Avi Networks
Enabling Remote Employees with Horizon VDI and Avi Networks
Avi Networks
 
Multi-Cloud Load Balancing – Separating Fact from Fiction
Multi-Cloud Load Balancing – Separating Fact from FictionMulti-Cloud Load Balancing – Separating Fact from Fiction
Multi-Cloud Load Balancing – Separating Fact from Fiction
Avi Networks
 

More from Avi Networks (20)

DR On Demand At Fraction of the Cost (1).pptx
DR On Demand At Fraction of the Cost (1).pptxDR On Demand At Fraction of the Cost (1).pptx
DR On Demand At Fraction of the Cost (1).pptx
 
Cloud_controllers_public_webinar_aug31_v1.pptx
Cloud_controllers_public_webinar_aug31_v1.pptxCloud_controllers_public_webinar_aug31_v1.pptx
Cloud_controllers_public_webinar_aug31_v1.pptx
 
Top 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load Balancer
Top 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load BalancerTop 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load Balancer
Top 4 Reasons to Migrate From NSX Load Balancing to NSX Advanced Load Balancer
 
23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx
23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx
23.06.15 NSX ALB and vCD integration deepdive_webinar0615.pptx
 
Enterprises-Have-Replaced-12000-ADCs-See-Why.pptx
Enterprises-Have-Replaced-12000-ADCs-See-Why.pptxEnterprises-Have-Replaced-12000-ADCs-See-Why.pptx
Enterprises-Have-Replaced-12000-ADCs-See-Why.pptx
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 Virtualize Application Security Today - Hardware is No Longer Needed.pptx Virtualize Application Security Today - Hardware is No Longer Needed.pptx
Virtualize Application Security Today - Hardware is No Longer Needed.pptx
 
Deploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load BalancingDeploying Elastic Self-Service Load Balancing
Deploying Elastic Self-Service Load Balancing
 
NSX_Advanced_Load_Balancer_Solution_with_Oracle.pptx
NSX_Advanced_Load_Balancer_Solution_with_Oracle.pptxNSX_Advanced_Load_Balancer_Solution_with_Oracle.pptx
NSX_Advanced_Load_Balancer_Solution_with_Oracle.pptx
 
Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation
Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation
Delivering Turnkey Load Balancing in VMware Cloud with Day 0 Automation
 
Avi workshop-101
Avi workshop-101Avi workshop-101
Avi workshop-101
 
Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI
Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI
Working From Anywhere​ with​ Advanced Load Balancing​ and ​ VMware Horizon VDI
 
Deploying Elastic, Self-Service Load Balancing for VMware NSX-T
Deploying Elastic, Self-Service Load Balancing for VMware NSX-TDeploying Elastic, Self-Service Load Balancing for VMware NSX-T
Deploying Elastic, Self-Service Load Balancing for VMware NSX-T
 
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load BalancingAvi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
Avi v20.1 — What’s New in Scalable, Multi-Cloud Load Balancing
 
Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)
Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)
Enterprise-Grade Load Balancing for VMware Cloud on AWS (VMC)
 
Multi Cloud Load Balancing 101 and Hands On Lab
Multi Cloud Load Balancing 101 and Hands On LabMulti Cloud Load Balancing 101 and Hands On Lab
Multi Cloud Load Balancing 101 and Hands On Lab
 
Multi Cloud Load balancing 101 and Hands-on Lab
Multi Cloud Load balancing 101 and Hands-on LabMulti Cloud Load balancing 101 and Hands-on Lab
Multi Cloud Load balancing 101 and Hands-on Lab
 
Multi-Cloud Load Balancing 101 and Hands-On Lab
Multi-Cloud Load Balancing 101 and Hands-On LabMulti-Cloud Load Balancing 101 and Hands-On Lab
Multi-Cloud Load Balancing 101 and Hands-On Lab
 
Enabling Remote Employees with Horizon VDI and Avi Networks
Enabling Remote Employees with Horizon VDI and Avi NetworksEnabling Remote Employees with Horizon VDI and Avi Networks
Enabling Remote Employees with Horizon VDI and Avi Networks
 
Multi-Cloud Load Balancing – Separating Fact from Fiction
Multi-Cloud Load Balancing – Separating Fact from FictionMulti-Cloud Load Balancing – Separating Fact from Fiction
Multi-Cloud Load Balancing – Separating Fact from Fiction
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Web Application Security for Continuous Delivery Pipelines

  • 1. Web Application security for continuous delivery pipelines Christian Treutler, Avi Networks
  • 2. AppSec DefenderEngineer at heart Christian Treutler Interested in (sometimes scared by) Security Automation, IoT security, Big Data security, AI security implications. Security evangelist
  • 3. Agenda 1. Mission statement 2. CICD Introduction 3. Demo: Rolling out a new version 4. How to build application security into a CICD pipeline from a WAF perspective? 5. Demo: Pipeline with enabled WAF 6. Demo: Security with ”infra as code”
  • 4. Mission Statement: Including AppSec into CICD environments can be achieved with the right tools. Teams must work together closely to allow this kind of automation to succeed.
  • 5. Continuous Delivery Introduction “Continuous Delivery is a software development discipline where you build software in such a way that the software can be released to production at any time.” – Martin Fowler “Our goal is to make deployments—whether of a large-scale distributed system, a complex production environment, an embedded system, or an app—predictable, routine affairs that can be performed on demand.” - Jez Humble Continuous Delivery involves automation and integration of all stages of software development including – development, build, test, acceptance, configuration management, infrastructure, provisioning and ultimately release!
  • 6. Running a successful CICD The very short version. For detailed information, please see references at the end of the slide deck. Goals Predictable, reliable, fast and better quality! Business – Sales, PM and Customers love this! Operations Organizational Success metrics How to express the Pass / Fail decision? Use Normalized metrics Metrics measuring Quality is more important than Quantity Benchmark your application! Process Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service Feedback delay as small as possible Deployment Application config as code Check Apply Updates Validate & Record Continuous Integration Software Build Integration Tests Sandbox Production Deployment Automation
  • 8. Demo Environment Application: vulnerable application Hackazon Application lifecycle includes security scanning and iWAF Protection All parts use “infrastructure as code” Kubernetes: a cluster of 3 nodes + dashboard Service Mesh: Avi with iWAF module CICD: Concourse Gitea: local GIT repository Docker registry OWASP ZAP scanner All services run on Kubernetes in Docker containers
  • 9. BARE METAL VIRTUALIZED CONTAINERSON PREMISES PUBLIC CLOUDVIRTUALIZED CONTAINERS Modern, Scalable, Multi-Cloud Architecture CONTROLLER (SaaS / Self-Managed) SERVICE ENGINE SEPARATE CONTROL & DATA PLANE ELASTICITY INTELLIGENCE AUTOMATIONMULTI-CLOUD Copyright © 2018 Avi Networks
  • 10. K8S Node K8S Master DC: app1 K8S Node Pod 4Pod 3 K8S Node Pod 2Pod 1 K8S Node Avi Controller Avi Service Engine Proxy Functions: • Full-Featured Service Proxy (Distributed Load Balancing: L4-7) • Service Discovery (DNS, IPAM) • App Maps, Service Performance Monitoring, Connection log search and analytics • Security Rules, Web App Firewall, and Traffic Encryption • Application Auto-Scaling Avi’s Container Services for OpenShift/Kubernetes Distributed Proxy for both North-South (Ingress) and East-West Traffic
  • 11. Demo 1 CICD in an application security context
  • 12. CICD in an application security context Which parts of AppSec can be applied? DAST, SAST, Vulnerability management (Black and white box testing) Trusted solutions Usually automatable in test/staging through APIs Success metric: vulnerabilities within expected numbers Misc. DDoS Protection – part of ADC/LB requirements Transport Security – TLS encryption – ADC Virus/Malware scanning – application or agent based Success metric: depends on requirements RASP Runtime Application Self-Protection Built into the application / tool chain Essentially part of the application Success metric: application test is green WAF Application protection (usually proxy based) WAF policy needs to be part of application or infra code Must deployed in all environments (dev, test ,production) Success metric: application test is green
  • 13. Challenges of AppSec vs Dev High level view Infrastructure does not support security requirements Vendor/product X does not support security requirement foo. Security is a first class feature Should be part of company DNA Security education Every employee needs to be educated about the implications if security best practices are not met. Features vs. Security When planned and designed correctly security is part of a feature and not something that competes for the same resources. Team Silos Security is a team effort and will fail it not all teams take their share of the responsibility.
  • 14. Demo 2 Designing a CICD pipeline with Web Application Firewall
  • 15. Legacy WAF challenges with CICD Elasticity, Scalability, Programmability, Automation, Management as code PROPRIETARY HARDWARE Costly Refresh Cycle Tied to Environment MANAGE EACH DEVICE No central management No central monitoring NO AUTOMATION Incomplete REST API No plug-n-play automation NO TELEMETRY LBs are black boxes No analytics or insights STATIC CAPACITY Requires overprovisioning No cloud like elasticity
  • 16. CICD example: WAF – properties for a working solution An overview Mindset • Application developer, security networking all work together • Application developer accepts WAF as a additional security layer to protect the application • Application developer uses WAF analytics for application behavior analysis • Security team defines security requirements and risk assessments • Security team provides oversight and guidance Infrastructure • Pure software solution that supports deployment anywhere with the application • Integration into a Load Balancer or Web Server • Automation (APIs, SDK, integrations) • Orchestration integration (Cloud, Container, Scalable) • Insights, metrics Process • WAF is part of all stages of the development process • WAF policy is owned by application developer and kept with the application source code • WAF policy changes are tracked within the source code repository with ticket management • Security audit process: security team can monitor and approve policy changes if needed (pull requests) • Every application uses the default security policy (for that specific application type, risk profile)
  • 17. CICD workflow with WAF – development Sample integration of a WAF into a CICD workflow: Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service Develop WAF is part of the development process. If needed WAF policy is updated by the developer. Security team approves the changes to the WAF policy. WAF policy is part of the application code and will be rolled out with application build.
  • 18. CICD workflow with WAF – build Sample integration of a WAF into a CICD workflow: Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service Build WAF has no part in the build process, since it does not directly influence the application code.
  • 19. CICD workflow with WAF – test Sample integration of a WAF into a CICD workflow: Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service Test All tests are run with the new build. Test environment uses stored WAF policy. Any test failures or unexpected WAF findings can trigger a new ticket for the developer to investigate and fix. Tests include unit, functional and ideally end-to- end tests. Caveat: Simulated test traffic is usually inferior to real world traffic.
  • 20. CICD workflow with WAF – deploy Sample integration of a WAF into a CICD workflow: Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service Deploy WAF gets deployed alongside application code.
  • 21. CICD workflow with WAF – monitor / validate Sample integration of a WAF into a CICD workflow: Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service Monitor / Validate WAF metrics will provide necessary insight into the health and expected WAF behavior to measure.
  • 22. CICD workflow with WAF – in-service / out-of-service Sample integration of a WAF into a CICD workflow: Develop Build Test Deploy Monitor / Validate In-Service / Out-of-service In-Service / Out-of-service According to the success criteria the new application code is put in-service and the old application code is taken out-of-service. WAF metrics can have a direct impact on the cut over if they degrade. It is one part of the success criteria.
  • 23. Demo 3 Security with ”infrastructure as code”
  • 24. ●1. Continuous Delivery transcends technical, cultural, process and business aspects of any team. ●2. Deployment decisions can be automated – provided metrics are wisely used. ●3. If possible make your applications elastic and set it up such that it can scale-out and scale-in during the deployment evaluation. ●4. Modern tools for CI, configuration management, deployment pipeline automation, ONF (SDN), public and private cloud programmability allows complex applications to be easily deployed. ●1. As Continuous Delivery is introduced the security strategy of a company is a key factor for success. ●2. Application security process is required. ●3. Any WAFs that supports the infrastructure requirements can be used for CICD. ●4. A WAF needs to provide metrics (via API) for evaluation of successful deployment and operations. ●5. Change management is crucial and auditing must be possible (trace of configuration changes). Summary: Continuous Delivery with and without Application Security focus
  • 25. Thank You! Christian Treutler, Avi Networks christian@avinetworks.com Next Steps 1. Learn about GDPR and WAF https://info.avinetworks.com/webinars/secure-web- applications-and-achieve-compliance 2. Schedule a demo https://info.avinetworks.com/schedule-a-demo 3. Get your hands “dirty” https://github.com/avinetworks/devops/tree/master/an sible/deployment_pipeline
  • 26. References Jez Humble, https://continuousdelivery.com Martin Fowler, https://martinfowler.com/delivery.html Chen, Lianping, Paddy Power. Continuous Delivery: Huge Benefits, but Challenges Too. IEEE Software. 32. 10.1109/MS.2015.27 Demo code is available at github Download Avi Solution from www.avinetworks.com https://github.com/avinetworks/devops/tree/master/ansible/deployment_pipeline