achieving secure
play

Achieving Secure Continuous Delivery (cont..) --lightning talk-- - PowerPoint PPT Presentation

Achieving Secure Continuous Delivery (cont..) --lightning talk-- Nikos / Jesus / Lucian April 2018 Typical discussions X Pain points Same problem in 2018! Security requirements appear (dark magic!) when project is almost finished


  1. Achieving Secure 
 Continuous Delivery (cont..) 
 --lightning talk-- Nikos / Jesus / Lucian April 2018

  2. Typical discussions… X

  3. Pain points Same problem in 2018! Security requirements appear (dark magic!) when project is almost finished Difficult access to (uncorrelated) vulnerability data Security sign-off is a bottleneck [choke] No clear view on the security risk of a specific build or release Security testing tools! Lots of tools!! And reports!!! No real agreed security gate (no trigger threshold) When am I finally secure enough? Never! Short memory! Tools get easily forgotten or abandoned… says Mordac. Product has a Roadmap and Security is (always) not (always) part of it

  4. Tools!! SAST list HERE DAST list HERE Dependency Checking Tools list HERE Container Security tools HERE Google list HERE Others HERE Link HERE

  5. The Want Automation & centralisation of application security testing Risk based approach to application delivery & deployment Security Champions process and responsibilities

  6. Existing initiatives Lots!!! OWASP AppSec Pipeline OWASP OWTF OWASP Defect Dojo OWASP Israel Others talking about this HERE HERE HERE HERE HERE HERE HERE HERE HERE HERE HERE HERE HERE HERE STDD Christian Schneider SAMPLE OWASP AppSec Pipeline

  7. Where we are now Zed Attack Proxy Security

  8. Developer Jenkins

  9. Security Jenkins 1. How does Jenkins run tools 2. How does Threadfix receive results 4. How we inform 3. Check my policy

  10. Threadfix policies

  11. Fixing the stuff

  12. Next? What is best for you and your businesses‘ appetite? Get a DevSecOps team to build and maintain toolz&stuff for you £££ OWASP project (Pipelines?) to support all free tool inputs into one central repo (Somehow) work with commercial tool providers to support that Inspire and empower your Security Champions

  13. Q/A

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend