SlideShare a Scribd company logo
© 2019 Synopsys, Inc.1
Creating a Modern AppSec Toolchain to
Quantify Service Risks
Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Center
© 2019 Synopsys, Inc.2
Modern Application Development and Risk
It’s not just about the applications…think process
© 2019 Synopsys, Inc.3
Being a security target is costly
Average cost of data breach:
$3.86 Million
Lost business:
$4.20 Million
Average time to identify
and contain a breach:
266 days
Source: 2018 Cost of Data Breach Study (US Data)
– Ponemon Institute
© 2019 Synopsys, Inc.4
Certifications and regulations guide current processes
On-Prem Infrastructure Policies
• DISA STIG, OVAL Definitions and XCCDF
• Managed via Chef, Puppet, Ansible,
Raw SSH tooling
• Private cloud adopts similar policies
Public Cloud Infrastructure Policies
• Provider responsible for infrastructure security
• Tenant remains responsible for VM security
Some operational risk transferred to provider
Focus for Certifications and Regulations
• PCI, PII and PHI
• Process centric and often not technology aware
• Developers assume compliance and no feedback loop
• NIST 800-137 focused on process
• Continuous monitoring isn’t prescriptive
NIST 800-137
© 2019 Synopsys, Inc.5
Equifax breach focused attention on open source
© 2019 Synopsys, Inc.6
Modern application
=
Proprietary Code
+
Open Source Components
+
API Usage
+
Application
Behavior and Configuration
© 2019 Synopsys, Inc.7
Gartner definition of DevSecOps
Information security architects must
• Integrate security at multiple points and
• Preserve teamwork, agility and speed in dev environments
Security activities must be an integral part of the
DevSecOps pipeline. DevOps teams have to own security
the same way they own development and operations.
Sec
© 2019 Synopsys, Inc.8
Ouch – Not so good!
© 2019 Synopsys, Inc.9
Sec By 2021, DevSecOps practices will
be embedded in 80% of rapid
development teams Source: Gartner, Integrating Security
Into the DevSecOps Toolchain Nov. 16, 2017.
Higher
speed
Reduced
friction
Continuous
feedback
Lower
cost
$
© 2019 Synopsys, Inc.10
The toolchain starts with process
i.e. define security targets and build toolchain from that
© 2019 Synopsys, Inc.11
DevSecOps Pipeline: Agile quality and security checks
Build Test Prod
Ops
Deploy
Dev
IDE Feedback
• Functional tests
• Load test
• Performance test
• DAST/IAST
• Penetration test
•Risk assessment
•Threat model
•Lightweight SAST
•Local unit tests
•Network scanning
•Continuous monitoring
•Env/Config validation
•Threat intelligence
•CVE reports
•Regulatory changes
•Static analysis
•SCA
•Unit tests
•Config tests
•Hardening check
© 2019 Synopsys, Inc.12
Example: IoT takes over the world
• Limited CPU resources
• Limited RAM for features
• C/C++ typical
• MQTT common protocol
• Responsive application
• View device data
• View historical information
Web UI
4
4
• Lightweight protocol
• High volume
• Pub/Sub interface
MQTT Broker
Encrypted data
published via MQTT2
IoT Device
• iOS/Android application
• Configure device
• View device data
• Receive notifications
Mobile Interface1
Configure
via Bluetooth
represents constraints
in the system
3
Data stored
for analysis
Analysis Engine
Authentication
and
Authorization
Analysis
Engine MQTT
WebSocket
Core
Data
• Avoid MITM
• Certification
of image
OTA
© 2019 Synopsys, Inc.13
The risks we control
© 2019 Synopsys, Inc.14
Identify security targets from platform requirements
Goal:
Select an IoT
toolchain meeting
product and cost
requirements
Role: Security Architect with CISO and Product Owner guidance
Tasks and requirements:
1. Select platform supporting desired protocols
• Protocol implementations must be resilient
2. Select candidate vendor or open source stack
3. Validate protocols against cost and stability
• Define protocol fuzzing framework
4. Report on security targets during development
© 2019 Synopsys, Inc.15
Select development frameworks and environment
Role: Development Lead with Product Owner guidance
Goal:
Select frameworks
capable of meeting
time to market and
security targets
Tasks and requirements
1. Select languages based on security
2. Define build environment
3. Identify commercial and open source
frameworks and libraries
• Define governance for security updates
4. Enable IDE security plugins
5. Enable build time CI analysis
© 2019 Synopsys, Inc.16
Perform continuous security assessments
Role: Developer with Development Lead guidance
Goal:
Identify security
governance issues
prior to commits
Tasks:
1. Transparent security review during coding
• No disruption to existing workflows
2. Remediation and contextual guidance
• Lower defect costs by shifting left
3. Developer reviews results before merging
© 2019 Synopsys, Inc.17
Catch complex security issues during build
Role: Release Engineer with guidance from QA and Product Owner
Goal:
Ensure release
meets security and
functional targets
Tasks and requirements:
1. Build triggered from merge/pull request
2. Detailed scans run parallel to build process
3. Optionally fail builds based on security
targets/exceptions
4. Analysis summaries fed back to IDE plugins
5. Centralized security progress tracking
© 2019 Synopsys, Inc.18
Confirm governance and security target progress
Role: Security Architect
Goal:
Ensure release
meets security and
functional targets
Tasks:
1. Centralized view of security results
2. Review by common taxonomy
• (OWASP Top 10, SANS Top 25)
3. Triage issue status via defect workflows
4. Measure progress against governance targets
5. Define security targets for future releases
© 2019 Synopsys, Inc.19
The risks controlling us
© 2019 Synopsys, Inc.20
Web services API usage
API Lifecycle
• Twitter API shutdown August 2018
• Google+ shutdown April 2019
• Salesforce API versioning
Data usage and control
• GDPR data processor vs data controller
• Data sovereignty and jurisdiction
• Data mashups and inference scenarios
Data and privacy breaches
• Facebook API tokens
• [24]7.io and Delta, Kmart, Sears
• Third-party data bleeds
• Phone home tracking
• CVE-2018-1002105 in Kubernetes API
© 2019 Synopsys, Inc.21
External factors impacting risk – ah dependencies!
• Explicit open source usage
–Component origin, security and update process
–How is the component linked in the application
–Versioning semantics
• Implicit open source usage
–Component embedded in binary library
–Vendor support statements
–Vendor data management
• Impact of “Point in Time” Decisions
–Who tracks and updates cached components?
–Community engagement
–Development directions
© 2019 Synopsys, Inc.22
Threat landscape controlled by actors not defenders
Threat Agents
• Scan networks for weakness using toolkits
• Success is a numbers game – zero knowledge of target
• Perimeter Defenses can be false positives
• Utilize multi-factors for attack reconnaissance
Infiltration
• Occurs through at least one vector
• Creates beachheads supporting infection, C&C and lateral movement
• Exploits latent vulnerabilities and misconfigurations
Mitigation powered by information flow
• Can’t exploit what doesn’t exist
• Focus attention on unpatched services
• Open source originates from multiple channels and patches must match
• Recognizes that attack landscape evolves
Global IP
Space
Managed
Systems
Accessible
Systems
Vulnerability
Present
© 2019 Synopsys, Inc.23
Bringing it all together to keep pace
© 2019 Synopsys, Inc.24
Keeping up requires a strategic security initiative (SSI)
Security
tools
CI/CD
DevOps
Vulnerabilities
Regulatory
requirements
Product release
acceleration
Vendors and
supply chains
Languages,
frameworks,
architectures
Attackers
and attacksAgile
Open
Source
Containers
© 2019 Synopsys, Inc.25
Strategy and planning
Measure your SSI to highlight efforts and gaps
Maturity Action Plan (MAP)
Building Security In Maturity
Model (BSIMM)
© 2019 Synopsys, Inc.26
Addressing AppSec gaps: Outsource Security Ninjas
Internal
resource capacity
Internal resources
Outsourced
Security Testing
Company
acquisition
Security
breach
Product
release
Compliance
audit
TRIGGERING EVENTS
Resource demand
© 2019 Synopsys, Inc.27
Sec
plan code build test release deploy monitoroperate
© 2019 Synopsys, Inc.28
plan code build test release deploy monitoroperate
Central Server
Build and Test Environment
Integrated Analysis Engines
Centralized
Management
Consolidated
Reporting
Alerting &
Workflow
CI/CD and DevOps
Integration
SaaS/Private Cloud
Deployment
Code Sight
Developer Environment
Integrated Local +
Central Analysis
IDE Plugin
IntelliJ, Eclipse, Visual Studio
Context-Sensitive
eLearning
© 2019 Synopsys, Inc.29
Security Toolchain – Synopsys Polaris with Code Sight
Code Sight IDE Plugins
3
• Invoke analysis
• Perform capture and
send to platform
CI/CD
Integration
2
• Run analysis on the platform
• Central issue triage and management
• Centralized reporting
56
1
• Support all popular IDEs
• Incremental, high-fidelity analysis
• Local issue triage and management
• Check in to SCM and trigger central builds
• Complement central scans
Polaris Central
Server in the
Public/Private Cloud
Alert and
notifications
4
© 2019 Synopsys, Inc.30
Policies &
Standards
ARA
Software Security Group, Model, and Initiatives
Security Training/eLearning
Outsource Security Ninjas
SCA
SAST IAST DAST & Pen Testing
plan code build test release deploy monitoroperate
Threat
Modeling
Red Teaming & Pen
Testing
WAF/RASP
© 2019 Synopsys, Inc.31
Key takeaways
Measure progress against targets and changes in direction
• Identify opportunities to reduce business risk with new technologies
• Design update mechanisms for resiliency against MITM attacks
• Legacy best practices may increase risk when applied to new paradigms
Reduce risks of non-compliance
• Implement continuous monitoring of all deployed apps, complete with dependency inventory
• Reassess point in time decisions and impact of new regulations
• Proactively compare running infrastructure against configured infrastructure for deltas
Define security targets when selecting components and toolchains
• Ensure criteria is understood in Ops, Development and Procurement
• Train all development and operations teams to identify changes in risk
• Document decisions impacting risk acceptance at all points in the SDLC
© 2019 Synopsys, Inc.32
Build Secure, High-Quality Software Faster
© 2019 Synopsys, Inc.33
Embedding security targets within your toolchain
Developer
Build
Test
Deploy
Production
Feedback and Security
Monitoring

More Related Content

PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
Webinar–Best Practices for DevSecOps at Scale
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Webinar – Risk-based adaptive DevSecOps
PDF
Webinar–That is Not How This Works
Webinar–The 2019 Open Source Year in Review
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Best Practices for DevSecOps at Scale
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–5 ways to risk rank your vulnerabilities
Webinar – Risk-based adaptive DevSecOps
Webinar–That is Not How This Works

What's hot (19)

PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Using Evidence-Based Security
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
PDF
Preventing Code Leaks & Other Critical Security Risks from Code
PPTX
Black Duck & IBM Present: Application Security in the Age of Open Source
PDF
Webinar–AppSec: Hype or Reality
PDF
Software Security Assurance for DevOps
PDF
Buyer and Seller Perspectives on Open Source in Tech Contracts
PDF
Webinar – Security Tool Misconfiguration and Abuse
PPTX
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PPTX
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Webinar–OWASP Top 10 for JavaScript for Developers
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–What You Need To Know About Open Source Licensing
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Using Evidence-Based Security
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–The State of Open Source in M&A Transactions
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Preventing Code Leaks & Other Critical Security Risks from Code
Black Duck & IBM Present: Application Security in the Age of Open Source
Webinar–AppSec: Hype or Reality
Software Security Assurance for DevOps
Buyer and Seller Perspectives on Open Source in Tech Contracts
Webinar – Security Tool Misconfiguration and Abuse
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Ad

Similar to Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks (20)

PDF
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PPTX
Secure DevOPS Implementation Guidance
PDF
Assessing Business Operations Risk With Unified Vulnerability Management in T...
PPTX
Automate and Enhance Application Security Analysis
PPTX
Automate and Enhance Application Security Analysis
PPTX
Webinar–Reviewing Modern JavaScript Applications
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PDF
Webinar–Building A Culture of Secure Programming in Your Organization
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Synopsys_site.pptx
PPTX
IBM Relay 2015: Securing the Future
 
PPTX
Shift Left for More Secure Apps with F5 NGINX
PPTX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
PDF
Take Control: Design a Complete DevSecOps Program
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Bridging the Security Testing Gap in Your CI/CD Pipeline
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Secure DevOPS Implementation Guidance
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
Webinar–Reviewing Modern JavaScript Applications
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Vulnerabilities in Containerised Production Environments
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Synopsys_site.pptx
IBM Relay 2015: Securing the Future
 
Shift Left for More Secure Apps with F5 NGINX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Take Control: Design a Complete DevSecOps Program
Ad

More from Synopsys Software Integrity Group (8)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Software Security 2019–Embrace Velocity
PDF
Webinar - Developers Are Your Greatest AppSec Resource
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PDF
Infographic–A Look Back at the First Year of GDPR
PDF
Webinar–2019 Open Source Risk Analysis Report
PDF
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Segen oder Fluch?
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Software Security 2019–Embrace Velocity
Webinar - Developers Are Your Greatest AppSec Resource
Webinar – Using Metrics to Drive Your Software Security Initiative
Infographic–A Look Back at the First Year of GDPR
Webinar–2019 Open Source Risk Analysis Report
Webinar–Open Source Risk in M&A by the Numbers

Recently uploaded (20)

PPTX
Online Work Permit System for Fast Permit Processing
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
AI in Product Development-omnex systems
PPT
Introduction Database Management System for Course Database
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Nekopoi APK 2025 free lastest update
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
medical staffing services at VALiNTRY
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
ai tools demonstartion for schools and inter college
PPTX
Transform Your Business with a Software ERP System
PPTX
history of c programming in notes for students .pptx
Online Work Permit System for Fast Permit Processing
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
CHAPTER 2 - PM Management and IT Context
AI in Product Development-omnex systems
Introduction Database Management System for Course Database
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Wondershare Filmora 15 Crack With Activation Key [2025
Nekopoi APK 2025 free lastest update
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
medical staffing services at VALiNTRY
PTS Company Brochure 2025 (1).pdf.......
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
ai tools demonstartion for schools and inter college
Transform Your Business with a Software ERP System
history of c programming in notes for students .pptx

Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks

  • 1. © 2019 Synopsys, Inc.1 Creating a Modern AppSec Toolchain to Quantify Service Risks Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Center
  • 2. © 2019 Synopsys, Inc.2 Modern Application Development and Risk It’s not just about the applications…think process
  • 3. © 2019 Synopsys, Inc.3 Being a security target is costly Average cost of data breach: $3.86 Million Lost business: $4.20 Million Average time to identify and contain a breach: 266 days Source: 2018 Cost of Data Breach Study (US Data) – Ponemon Institute
  • 4. © 2019 Synopsys, Inc.4 Certifications and regulations guide current processes On-Prem Infrastructure Policies • DISA STIG, OVAL Definitions and XCCDF • Managed via Chef, Puppet, Ansible, Raw SSH tooling • Private cloud adopts similar policies Public Cloud Infrastructure Policies • Provider responsible for infrastructure security • Tenant remains responsible for VM security Some operational risk transferred to provider Focus for Certifications and Regulations • PCI, PII and PHI • Process centric and often not technology aware • Developers assume compliance and no feedback loop • NIST 800-137 focused on process • Continuous monitoring isn’t prescriptive NIST 800-137
  • 5. © 2019 Synopsys, Inc.5 Equifax breach focused attention on open source
  • 6. © 2019 Synopsys, Inc.6 Modern application = Proprietary Code + Open Source Components + API Usage + Application Behavior and Configuration
  • 7. © 2019 Synopsys, Inc.7 Gartner definition of DevSecOps Information security architects must • Integrate security at multiple points and • Preserve teamwork, agility and speed in dev environments Security activities must be an integral part of the DevSecOps pipeline. DevOps teams have to own security the same way they own development and operations. Sec
  • 8. © 2019 Synopsys, Inc.8 Ouch – Not so good!
  • 9. © 2019 Synopsys, Inc.9 Sec By 2021, DevSecOps practices will be embedded in 80% of rapid development teams Source: Gartner, Integrating Security Into the DevSecOps Toolchain Nov. 16, 2017. Higher speed Reduced friction Continuous feedback Lower cost $
  • 10. © 2019 Synopsys, Inc.10 The toolchain starts with process i.e. define security targets and build toolchain from that
  • 11. © 2019 Synopsys, Inc.11 DevSecOps Pipeline: Agile quality and security checks Build Test Prod Ops Deploy Dev IDE Feedback • Functional tests • Load test • Performance test • DAST/IAST • Penetration test •Risk assessment •Threat model •Lightweight SAST •Local unit tests •Network scanning •Continuous monitoring •Env/Config validation •Threat intelligence •CVE reports •Regulatory changes •Static analysis •SCA •Unit tests •Config tests •Hardening check
  • 12. © 2019 Synopsys, Inc.12 Example: IoT takes over the world • Limited CPU resources • Limited RAM for features • C/C++ typical • MQTT common protocol • Responsive application • View device data • View historical information Web UI 4 4 • Lightweight protocol • High volume • Pub/Sub interface MQTT Broker Encrypted data published via MQTT2 IoT Device • iOS/Android application • Configure device • View device data • Receive notifications Mobile Interface1 Configure via Bluetooth represents constraints in the system 3 Data stored for analysis Analysis Engine Authentication and Authorization Analysis Engine MQTT WebSocket Core Data • Avoid MITM • Certification of image OTA
  • 13. © 2019 Synopsys, Inc.13 The risks we control
  • 14. © 2019 Synopsys, Inc.14 Identify security targets from platform requirements Goal: Select an IoT toolchain meeting product and cost requirements Role: Security Architect with CISO and Product Owner guidance Tasks and requirements: 1. Select platform supporting desired protocols • Protocol implementations must be resilient 2. Select candidate vendor or open source stack 3. Validate protocols against cost and stability • Define protocol fuzzing framework 4. Report on security targets during development
  • 15. © 2019 Synopsys, Inc.15 Select development frameworks and environment Role: Development Lead with Product Owner guidance Goal: Select frameworks capable of meeting time to market and security targets Tasks and requirements 1. Select languages based on security 2. Define build environment 3. Identify commercial and open source frameworks and libraries • Define governance for security updates 4. Enable IDE security plugins 5. Enable build time CI analysis
  • 16. © 2019 Synopsys, Inc.16 Perform continuous security assessments Role: Developer with Development Lead guidance Goal: Identify security governance issues prior to commits Tasks: 1. Transparent security review during coding • No disruption to existing workflows 2. Remediation and contextual guidance • Lower defect costs by shifting left 3. Developer reviews results before merging
  • 17. © 2019 Synopsys, Inc.17 Catch complex security issues during build Role: Release Engineer with guidance from QA and Product Owner Goal: Ensure release meets security and functional targets Tasks and requirements: 1. Build triggered from merge/pull request 2. Detailed scans run parallel to build process 3. Optionally fail builds based on security targets/exceptions 4. Analysis summaries fed back to IDE plugins 5. Centralized security progress tracking
  • 18. © 2019 Synopsys, Inc.18 Confirm governance and security target progress Role: Security Architect Goal: Ensure release meets security and functional targets Tasks: 1. Centralized view of security results 2. Review by common taxonomy • (OWASP Top 10, SANS Top 25) 3. Triage issue status via defect workflows 4. Measure progress against governance targets 5. Define security targets for future releases
  • 19. © 2019 Synopsys, Inc.19 The risks controlling us
  • 20. © 2019 Synopsys, Inc.20 Web services API usage API Lifecycle • Twitter API shutdown August 2018 • Google+ shutdown April 2019 • Salesforce API versioning Data usage and control • GDPR data processor vs data controller • Data sovereignty and jurisdiction • Data mashups and inference scenarios Data and privacy breaches • Facebook API tokens • [24]7.io and Delta, Kmart, Sears • Third-party data bleeds • Phone home tracking • CVE-2018-1002105 in Kubernetes API
  • 21. © 2019 Synopsys, Inc.21 External factors impacting risk – ah dependencies! • Explicit open source usage –Component origin, security and update process –How is the component linked in the application –Versioning semantics • Implicit open source usage –Component embedded in binary library –Vendor support statements –Vendor data management • Impact of “Point in Time” Decisions –Who tracks and updates cached components? –Community engagement –Development directions
  • 22. © 2019 Synopsys, Inc.22 Threat landscape controlled by actors not defenders Threat Agents • Scan networks for weakness using toolkits • Success is a numbers game – zero knowledge of target • Perimeter Defenses can be false positives • Utilize multi-factors for attack reconnaissance Infiltration • Occurs through at least one vector • Creates beachheads supporting infection, C&C and lateral movement • Exploits latent vulnerabilities and misconfigurations Mitigation powered by information flow • Can’t exploit what doesn’t exist • Focus attention on unpatched services • Open source originates from multiple channels and patches must match • Recognizes that attack landscape evolves Global IP Space Managed Systems Accessible Systems Vulnerability Present
  • 23. © 2019 Synopsys, Inc.23 Bringing it all together to keep pace
  • 24. © 2019 Synopsys, Inc.24 Keeping up requires a strategic security initiative (SSI) Security tools CI/CD DevOps Vulnerabilities Regulatory requirements Product release acceleration Vendors and supply chains Languages, frameworks, architectures Attackers and attacksAgile Open Source Containers
  • 25. © 2019 Synopsys, Inc.25 Strategy and planning Measure your SSI to highlight efforts and gaps Maturity Action Plan (MAP) Building Security In Maturity Model (BSIMM)
  • 26. © 2019 Synopsys, Inc.26 Addressing AppSec gaps: Outsource Security Ninjas Internal resource capacity Internal resources Outsourced Security Testing Company acquisition Security breach Product release Compliance audit TRIGGERING EVENTS Resource demand
  • 27. © 2019 Synopsys, Inc.27 Sec plan code build test release deploy monitoroperate
  • 28. © 2019 Synopsys, Inc.28 plan code build test release deploy monitoroperate Central Server Build and Test Environment Integrated Analysis Engines Centralized Management Consolidated Reporting Alerting & Workflow CI/CD and DevOps Integration SaaS/Private Cloud Deployment Code Sight Developer Environment Integrated Local + Central Analysis IDE Plugin IntelliJ, Eclipse, Visual Studio Context-Sensitive eLearning
  • 29. © 2019 Synopsys, Inc.29 Security Toolchain – Synopsys Polaris with Code Sight Code Sight IDE Plugins 3 • Invoke analysis • Perform capture and send to platform CI/CD Integration 2 • Run analysis on the platform • Central issue triage and management • Centralized reporting 56 1 • Support all popular IDEs • Incremental, high-fidelity analysis • Local issue triage and management • Check in to SCM and trigger central builds • Complement central scans Polaris Central Server in the Public/Private Cloud Alert and notifications 4
  • 30. © 2019 Synopsys, Inc.30 Policies & Standards ARA Software Security Group, Model, and Initiatives Security Training/eLearning Outsource Security Ninjas SCA SAST IAST DAST & Pen Testing plan code build test release deploy monitoroperate Threat Modeling Red Teaming & Pen Testing WAF/RASP
  • 31. © 2019 Synopsys, Inc.31 Key takeaways Measure progress against targets and changes in direction • Identify opportunities to reduce business risk with new technologies • Design update mechanisms for resiliency against MITM attacks • Legacy best practices may increase risk when applied to new paradigms Reduce risks of non-compliance • Implement continuous monitoring of all deployed apps, complete with dependency inventory • Reassess point in time decisions and impact of new regulations • Proactively compare running infrastructure against configured infrastructure for deltas Define security targets when selecting components and toolchains • Ensure criteria is understood in Ops, Development and Procurement • Train all development and operations teams to identify changes in risk • Document decisions impacting risk acceptance at all points in the SDLC
  • 32. © 2019 Synopsys, Inc.32 Build Secure, High-Quality Software Faster
  • 33. © 2019 Synopsys, Inc.33 Embedding security targets within your toolchain Developer Build Test Deploy Production Feedback and Security Monitoring