Building an AppSec Pipeline: Keeping your program, and your life, sane

May. 28, 2015
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
Building an AppSec Pipeline: Keeping your program, and your life, sane
1 of 46

More Related Content

Slideshows for you

Practical DevSecOps Course - Part 1Practical DevSecOps Course - Part 1
Practical DevSecOps Course - Part 1Mohammed A. Imran
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOpsArchana Joshi
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines Abdul_Mujeeb
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...Mohamed Nizzad

Similar to Building an AppSec Pipeline: Keeping your program, and your life, sane

Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestMatt Tesauro
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterMatt Tesauro
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Matt Tesauro
Forward5 Auxis VMwareForward5 Auxis VMware
Forward5 Auxis VMwareAuxis Consulting & Outsourcing
Freedom and ResponsibilityFreedom and Responsibility
Freedom and ResponsibilityMike Ruangutai
How to go from waterfall app dev to secure agile development in 2 weeks How to go from waterfall app dev to secure agile development in 2 weeks
How to go from waterfall app dev to secure agile development in 2 weeks Ulf Mattsson

Similar to Building an AppSec Pipeline: Keeping your program, and your life, sane(20)

Recently uploaded

A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedAdtran
GDSC INFO.pptxGDSC INFO.pptx
GDSC INFO.pptxAshishChanchal1
ECE ANURANAN 2023ECE ANURANAN 2023
ECE ANURANAN 2023Bishal20Hazarika1034
An Introduction To Using ChatGPT For BusinessAn Introduction To Using ChatGPT For Business
An Introduction To Using ChatGPT For BusinessPaul Nguyen
Graph Neural Networks.pptxGraph Neural Networks.pptx
Graph Neural Networks.pptxKumar Iyer
NoSQL Database Migration Masterclass - Session 3: Migration LogisticsNoSQL Database Migration Masterclass - Session 3: Migration Logistics
NoSQL Database Migration Masterclass - Session 3: Migration LogisticsScyllaDB

Building an AppSec Pipeline: Keeping your program, and your life, sane

  1. Aaron Weaver Application Security Manager, Pearson plc Building an AppSec Pipeline: Keeping your program, and your life, sane
  2. 189 seconds is the average time in a drive-thru
  3. Instrumentation
  4. Standardization of products and processes. A Big Mac is a Big Mac wherever you purchase it in the U.S., and this emphasis on reliable and highly standardized product offerings, as well as uniform production processes, is something fast-food companies have perfected. Source: ValueStreamGuru.com
  5. A production process approach Different work cells within an individual restaurant combine to make the finished product, allowing for maximum efficiency in each work unit. Source: ValueStreamGuru.com
  6. A flexible and multi-skilled workforce Each employee specializing within a role but also being trained to step into other areas whenever needed. Source: ValueStreamGuru.com
  7. Lean production Maximizes the use of a facility's space. Fast- food kitchens are rarely large, but their output is tremendous, meaning they get the most from the limited space available. Source: ValueStreamGuru.com
  8. What would it look like if AppSec ran fast food?
  9. AppSec Pipeline
  10. Your front door
  11. minimal viable product [MVP] product
  12. Polled the Team ?
  13. Bag of Holding (BoH)
  14. What does BoH do? • Manages our Application Security Program • Application Repository • Engagement Tracking • Report Repository • Comments on any application, engagement or activity • Data Classification and PII data • Time taken on secure software activities • Historical knowledge of past assessments • Credential repository • Environment details
  15. Length of Activities
  16. 24
  17. 25 Social, erm Yes.
  18. 26
  19. Security Tool Vendors: If I can do it with the UI, I want to do it with an API. - Matt Tesauro
  20. | Open Source Orchestration • Integrate Security Tools and Workflow • Example: • Generic API for dynamic scanning • URL • Credentials • Profile • Call any Dynamic Scanner: • OWASP ZAP • BurpSuite • AppScan
  21. Automate False Positive Reduction 2+ 3+ 4+ 5+
  22. 34 Scheduling Application Assessments • PCI every quarter • Compliance policy requirement to manually assess twice a year
  23. Watch a Code Branch or the doAuth() method Change Exceeds Threshold Trigger a Review | Open Source 1 2 3 Automate Assessment Requests
  24. Your command line where you have your conversations. Will Bot
  25. AppSec Help
  26. AppSec Advice
  27. Threadfix Integration And more: • Create an Application • Get Summary Metrics for Application Program
  28. Threadfix/Static Integration
  29. Go build. Make it better.
  30. Q&A Thank you!
  31. @weavera aaron.weaver2@gmail.com /in/aweaver
  32. Photo Credits • Chicago street photography - The One That Got Away https://goo.gl/I6FLgl • Silos https://goo.gl/3g9M38 • Kid https://goo.gl/NlwmBW • Hipster https://goo.gl/52VUyV 46

Editor's Notes

  1. AppSec tools tend to be their own silo
  2. Instead of send around curl commands or distributing runtimes deploy it to your chatops server!