33
DevOps Security-Part1 An insight into S-SDLC SUMAN SOURAV

Devops security-An Insight into Secure-SDLC

Embed Size (px)

Citation preview

Page 1: Devops security-An Insight into Secure-SDLC

DevOps Security-Part1An insight into S-SDLC

SUMAN SOURAV

Page 2: Devops security-An Insight into Secure-SDLC

Agenda

DevOps Security –Introduction

Software Security Toll Gates in DevOps

An inside story of continuous security

testing implementation

Challenges

Page 3: Devops security-An Insight into Secure-SDLC

Disclaimer

Not endorsing any tools

Page 4: Devops security-An Insight into Secure-SDLC

About me Software Security Professional having 10+ years of

experience

Specialize in Secure SDLC implementation

Threat Modeling/Secure Code Review/Penetration Testing/DevOps Security

Secure Coding Trainer, SecurityQA Testing Trainer, Speaker

What next for me ?

IoT Security

SmartCity Security

Page 5: Devops security-An Insight into Secure-SDLC

DevOps-Introduction

Faster Release Cycle

Shortened Delivery Time

Unified Tools and Process

Integration between different teams

Page 6: Devops security-An Insight into Secure-SDLC

Secure-SDLC

Security Requirements

• Requirements

Threat Modeling

• Design

Secure Code Review

• Development

Vulnerability Scanning/PT

• Deployment

Monitoring

• Operation

Time to complete these activities ?

Page 7: Devops security-An Insight into Secure-SDLC

DevOps Security: Pre-Staging

Source : Kaspersky

Continuous Integration

Security Automation

Right Process, People, Tools

Collaboration & Sharing

Metrics and Data Analytics

Page 8: Devops security-An Insight into Secure-SDLC

Security Failures in DevOps

Dev Risk

Page 9: Devops security-An Insight into Secure-SDLC

DEVELOPMENT BUILD AND DEPLOY

STAGINGREQUIREMENTS

External

Repositorie

s

Common Components

DESIGN

Repository

SCM Tools

Security Test Automation

Threat Modeling

SCA Tools/IDE Plugins

VS/PT/IASTComponents Monitoring

Production

Monitoring

Page 10: Devops security-An Insight into Secure-SDLC

Third Party Libraries- Security Report

Page 11: Devops security-An Insight into Secure-SDLC

Collaboration

Product 1

Product 3

Product 2

Product 4 Product 5 Product 6 Product 7 Product 8

Product 9Security Champions

Page 12: Devops security-An Insight into Secure-SDLC

Requirements

Security Questionnaire

Automated Score Calculation

Provide guidance for component

selection

Page 13: Devops security-An Insight into Secure-SDLC

Design

Page 14: Devops security-An Insight into Secure-SDLC

Threat Modeling (Demo)

Automated

Approach

Page 15: Devops security-An Insight into Secure-SDLC

Development

Page 16: Devops security-An Insight into Secure-SDLC

Source Code Management

1. Branching

2. Ownerships

Page 17: Devops security-An Insight into Secure-SDLC

Secure Code Review-IDE Plugins

(Demo)

Develop and Test

Takes couple of mins to generate

vulnerability report

Page 18: Devops security-An Insight into Secure-SDLC

Vulnerability Coverage

• Detect most obvious

vulnerabilities

• Quickly Provide

Security posture of

the applications

Page 19: Devops security-An Insight into Secure-SDLC

Merging Reports

• Keep eyes of new issues

and fixed issues

• Less time in false positive

analysis

Page 20: Devops security-An Insight into Secure-SDLC

Build & Deployment

Page 21: Devops security-An Insight into Secure-SDLC

CI Tools

Jenkins

Hudsons

TeamCity etc

Page 22: Devops security-An Insight into Secure-SDLC

CI Tools Integration

Third Party libraries analysis

Static Analysis

Security Unit test Cases

Dynamic Analysis

Page 23: Devops security-An Insight into Secure-SDLC

QA Role- in DevOps Security

Security Review of

Requirements & Design

Documents

Security Static Code

Analysis Results Review

Dynamic Security Analysis

Penetration testing

including Fuzz Testing

Third Party Components

Review

QARole

Page 24: Devops security-An Insight into Secure-SDLC

Security Unit Test Cases (Demo)

Page 25: Devops security-An Insight into Secure-SDLC

CI Integration-DAST

Unit Test Cases Browsers Scanners Reports

Reference:

http://www.hindsightsoftware.com/blog/security-

testing-with-selenium-and-the-zed-attack-proxy-zap

Page 26: Devops security-An Insight into Secure-SDLC

Static Analysis Integration

BuildEnvironment

FixVulnerabilities

IntegrateWith Build

Upload toServer

ExecuteScan

Generatereport

SA

Developers

ReportingServer

Audit andRe-upload

Login

Page 27: Devops security-An Insight into Secure-SDLC

Interactive Application Security

Testing (IAST)

Accuracy without false positive

Testing is fast

Indifferent to the underlying

framework.

Page 28: Devops security-An Insight into Secure-SDLC

Vulnerability Management &

Hybrid Analysis

Static Analysis

Dynamic

Analysis

SecurityQA

VA/PT/IAST

Priority Fix

Page 29: Devops security-An Insight into Secure-SDLC

Security Metrics & Data Analytics

10

20

30

40

110

85

71

20

0

20

40

60

80

100

120

Release 1 Release 2 Release 3 Release 4

Training Index Bug Index

Page 30: Devops security-An Insight into Secure-SDLC

Bug Tracking System

Keep track of issue remediation

Workflow to Automate issues

creation & assigning ownership

Automated email alert to

respective product owners

Page 31: Devops security-An Insight into Secure-SDLC

Limitations & Challenges

All manual tests cant be automated

Test automations are not sequenced

Page 32: Devops security-An Insight into Secure-SDLC

Stay Tuned……..

DevOps Security-Part 2

--An insight into Security Operation

Page 33: Devops security-An Insight into Secure-SDLC

Suman Sourav@SumanS0urav

https://sg.linkedin.com/in/sumansourav