SlideShare a Scribd company logo
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 1@CoverosGene
Add Security Testing Tools to
Your Delivery Pipeline
Gene Gotimer
Senior Architect
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 2@CoverosGene
About Coveros
• Coveros builds security-critical applications using agile methods.
• Coveros Services
• Agile transformations
• Agile development and testing
• DevOps and continuous integration
• Application security analysis
• Agile & Security training
• Government qualifications
• DCAA approved rates and accounting
• TS facility clearance
Areas of Expertise
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 3@CoverosGene
Select Clients
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 4@CoverosGene
Security Testing
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 5@CoverosGene
Information Security
• Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or destruction.
• The key concepts of information security include:
• Confidentiality
• Integrity
• Availability
• + Authenticity
• + Non-Repudiation
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 6@CoverosGene
Security Testing
• Often put off until late or ignored completely
Fix security
issues and delay
release?
Release on time
and accept
security risks?
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 7@CoverosGene
Return on Investment
“Security is not an investment that provides a return, like
a new factory or a financial instrument. It's an expense
that, hopefully, pays for itself in cost savings.
Security is about loss prevention, not about earnings.
The term just doesn't make sense in this context.”
-- Bruce Schneier, Schneier on Security
https://www.schneier.com/blog/archives/2008/09/security_roi_1.html
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 8@CoverosGene
Security in the
Delivery Pipeline
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 9@CoverosGene
Security Tools
“If you think technology can solve
your security problems,
then you don't understand the problems and
you don't understand the technology.”
-- Bruce Schneier, Secrets & Lies
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 10@CoverosGene
Security Testing Process
1. Use tools to help detect the obvious security problems
2. Remediate
3. Search for less obvious security problems
4. Repeat
Better security
process
Fewer obvious
security issues
Better security
Time to find
less obvious
security issues
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 11@CoverosGene
Incorporate Security Testing
Do just enough
of each type of testing
early in the pipeline
to determine if
further testing is justified.
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 12@CoverosGene
Tools to Consider
Adding to the Process
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 13@CoverosGene
It is easier to protect less
mvn dependency:tree
mvn dependency:analyze
mvn com.ning.maven.plugins:
maven-dependency-versions-check-plugin
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 14@CoverosGene
Poor quality code is harder to maintain
… and harder to secure
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 15@CoverosGene
Make sure your tests actually test
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 16@CoverosGene
Keep libraries up-to-date
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 17@CoverosGene
Negative testing
User role testing
… what should users not be able to do?
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 18@CoverosGene
Use a proxy
OWASP ZAP
… and piggy-back on functional tests
passive proxy
active scanner
fuzzer
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 19@CoverosGene
Repeatable, reliable deployments
… and test that through practice
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 20@CoverosGene
Audit yourself
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 21@CoverosGene
Scan the web application
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 22@CoverosGene
Scan the web server configuration
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 23@CoverosGene
Scan the system
… before and after installing software
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 24@CoverosGene
Scan all the systems
… don’t forget the infrastructure
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 25@CoverosGene
Keep packages up-to-date
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 26@CoverosGene
Test performance
… even if you just watch the trends
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 27@CoverosGene
Test the database
… for security and performance
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 28@CoverosGene
Protect against hackers
… even on development and test systems
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 29@CoverosGene
Continuously improve
A little better is
still better.
Keep improving.
… and don’t expect perfectly secure
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 30@CoverosGene
Find more tools
© COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 31@CoverosGene
Questions?
Gene Gotimer
gene.gotimer@coveros.com
@CoverosGene

More Related Content

PPTX
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
PDF
It's not about you: Mobile security in 2016
PDF
How to scale mobile application security testing
PPTX
Episode IV: A New Scope
PDF
Netskope Overview
PDF
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
It's not about you: Mobile security in 2016
How to scale mobile application security testing
Episode IV: A New Scope
Netskope Overview
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Webinar: Stopping evasive malware - how a cloud sandbox array works
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill

What's hot (20)

PDF
SplunkLive! London 2016 Operational Security Intelligence
PPTX
Are open source and embedded software development on a collision course?
PPTX
Splunk at the Bank of England
PDF
Top 5 Data Security Strategies in QA
PDF
Preparing for the inevitable: The mobile incident response playbook
PDF
SOCIAL MEDIA AS A CYBER WEAPON
PDF
(Certificates2019)alireza.ghahrood
PDF
HeartBleed Bug, by Megat Muazzam [APNIC 38]
PDF
SplunkLive! London Enterprise Security & UBA
PDF
Webinar: A deep dive on ransomware
PDF
Republic Services Customer Presentation
PPTX
Practical DevSecOps Using Security Instrumentation
PDF
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PPTX
Cyber intro 2017_hebrew
PPTX
Build a Security Portfolio That Strengthens Your Security Posture
PDF
Sızma Testi Metodolojileri
PPTX
A Day in the Life of a GDPR Breach
PDF
SplunkLive! Stockholm 2017 - ABN AMRO Customer Presentation
PPTX
Analytics-Driven Security - How to Start and Continue the Journey
SplunkLive! London 2016 Operational Security Intelligence
Are open source and embedded software development on a collision course?
Splunk at the Bank of England
Top 5 Data Security Strategies in QA
Preparing for the inevitable: The mobile incident response playbook
SOCIAL MEDIA AS A CYBER WEAPON
(Certificates2019)alireza.ghahrood
HeartBleed Bug, by Megat Muazzam [APNIC 38]
SplunkLive! London Enterprise Security & UBA
Webinar: A deep dive on ransomware
Republic Services Customer Presentation
Practical DevSecOps Using Security Instrumentation
Threat Hunting with Deceptive Defense and Splunk Enterprise Security
CPX 2016 Moti Sagey Security Vendor Landscape
Cyber intro 2017_hebrew
Build a Security Portfolio That Strengthens Your Security Posture
Sızma Testi Metodolojileri
A Day in the Life of a GDPR Breach
SplunkLive! Stockholm 2017 - ABN AMRO Customer Presentation
Analytics-Driven Security - How to Start and Continue the Journey
Ad

Viewers also liked (13)

PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PDF
Simplex_Projects_2016
DOCX
PDF
Accountancy SA October issue
PPTX
LibdayLV 2016 apkopojums
PPTX
Disney Case Study
PPTX
Utopia e barbarie
PPTX
Presentation on Apple
PDF
Trucs et astuces pour débuter sereinement
PPTX
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
PPTX
18 Simple Cures for Boring Webinar Presentations
 
ODP
Paleolítico y Neolítico
Better Security Testing: Using the Cloud and Continuous Delivery
Simplex_Projects_2016
Accountancy SA October issue
LibdayLV 2016 apkopojums
Disney Case Study
Utopia e barbarie
Presentation on Apple
Trucs et astuces pour débuter sereinement
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
18 Simple Cures for Boring Webinar Presentations
 
Paleolítico y Neolítico
Ad

Similar to Add Security Testing Tools to Your Delivery Pipeline (20)

PDF
Add Security Testing Tools to Your Delivery Pipeline
PPTX
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PDF
Security Testing for Test Professionals
PPT
Software Security in the Real World
PDF
Security Testing for Testing Professionals
PDF
Tests Your Pipeline Might Be Missing
PPTX
Experiences Bringing CD to a DoD Project
PDF
Security Testing for Testing Professionals
PDF
Security Testing for Test Professionals
PDF
Security Testing for Test Professionals
PPTX
Tests Your Pipeline Might Be Missing
PPTX
Tests your pipeline might be missing
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PDF
Security Testing for Testing Professionals
PDF
Ensuring Security through Continuous Testing
PPTX
Integrating security into Continuous Delivery
PDF
A Better, Faster Pipeline for Software Delivery
PDF
How the Cloud Shifts the Burden of Security to Development
PPTX
A better faster pipeline for software delivery, even in the government
Add Security Testing Tools to Your Delivery Pipeline
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Better Security Testing: Using the Cloud and Continuous Delivery
Security Testing for Test Professionals
Software Security in the Real World
Security Testing for Testing Professionals
Tests Your Pipeline Might Be Missing
Experiences Bringing CD to a DoD Project
Security Testing for Testing Professionals
Security Testing for Test Professionals
Security Testing for Test Professionals
Tests Your Pipeline Might Be Missing
Tests your pipeline might be missing
Better Security Testing: Using the Cloud and Continuous Delivery
Security Testing for Testing Professionals
Ensuring Security through Continuous Testing
Integrating security into Continuous Delivery
A Better, Faster Pipeline for Software Delivery
How the Cloud Shifts the Burden of Security to Development
A better faster pipeline for software delivery, even in the government

More from Gene Gotimer (20)

PDF
Let's Do Bad Things to Unsecured Containers
PDF
Clean Your Cloud with Cloud Custodian slides
PDF
A Hands-on Intro to Containers- Nebraska.Code()
PDF
A Developer's Guide to Kubernetes Security
PDF
Fixing Git Catastrophes - Nebraska.Code()
PDF
KCDC- Keeping Secrets Out of Your Pipeline
PDF
How Fast Is My App? Performance Testing 101
PDF
A Developer’s Guide to Kubernetes Security
PDF
How I Learned to Stop Worrying and Love Legacy Code
PDF
Ten Ways To Doom Your DevOps
PPTX
Keeping Your Kubernetes Cluster Secure
PDF
Keeping your Kubernetes Cluster Secure
PDF
Explain DevOps To Me Like I’m Five: DevOps for Managers
PPTX
Keeping your Kubernetes Cluster Secure
PPTX
Creative Solutions to Already Solved Problems II
PPTX
Creative Solutions to Already Solved Problems
PDF
Get to Green: How to Safely Refactor Legacy Code
PDF
DevOps for Leadership
PDF
Pyramid Discussion: DevOps Adoption in Large, Slow Organizations
PDF
Building the Pipeline of My Dreams
Let's Do Bad Things to Unsecured Containers
Clean Your Cloud with Cloud Custodian slides
A Hands-on Intro to Containers- Nebraska.Code()
A Developer's Guide to Kubernetes Security
Fixing Git Catastrophes - Nebraska.Code()
KCDC- Keeping Secrets Out of Your Pipeline
How Fast Is My App? Performance Testing 101
A Developer’s Guide to Kubernetes Security
How I Learned to Stop Worrying and Love Legacy Code
Ten Ways To Doom Your DevOps
Keeping Your Kubernetes Cluster Secure
Keeping your Kubernetes Cluster Secure
Explain DevOps To Me Like I’m Five: DevOps for Managers
Keeping your Kubernetes Cluster Secure
Creative Solutions to Already Solved Problems II
Creative Solutions to Already Solved Problems
Get to Green: How to Safely Refactor Legacy Code
DevOps for Leadership
Pyramid Discussion: DevOps Adoption in Large, Slow Organizations
Building the Pipeline of My Dreams

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
top salesforce developer skills in 2025.pdf
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
medical staffing services at VALiNTRY
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
L1 - Introduction to python Backend.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Digital Strategies for Manufacturing Companies
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
System and Network Administration Chapter 2
PTS Company Brochure 2025 (1).pdf.......
Operating system designcfffgfgggggggvggggggggg
top salesforce developer skills in 2025.pdf
Understanding Forklifts - TECH EHS Solution
Reimagine Home Health with the Power of Agentic AI​
medical staffing services at VALiNTRY
How to Migrate SBCGlobal Email to Yahoo Easily
L1 - Introduction to python Backend.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
2025 Textile ERP Trends: SAP, Odoo & Oracle
Navsoft: AI-Powered Business Solutions & Custom Software Development
Odoo POS Development Services by CandidRoot Solutions
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Digital Strategies for Manufacturing Companies
Odoo Companies in India – Driving Business Transformation.pdf
Design an Analysis of Algorithms II-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Adobe Illustrator 28.6 Crack My Vision of Vector Design

Add Security Testing Tools to Your Delivery Pipeline

  • 1. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 1@CoverosGene Add Security Testing Tools to Your Delivery Pipeline Gene Gotimer Senior Architect
  • 2. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 2@CoverosGene About Coveros • Coveros builds security-critical applications using agile methods. • Coveros Services • Agile transformations • Agile development and testing • DevOps and continuous integration • Application security analysis • Agile & Security training • Government qualifications • DCAA approved rates and accounting • TS facility clearance Areas of Expertise
  • 3. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 3@CoverosGene Select Clients
  • 4. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 4@CoverosGene Security Testing
  • 5. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 5@CoverosGene Information Security • Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. • The key concepts of information security include: • Confidentiality • Integrity • Availability • + Authenticity • + Non-Repudiation
  • 6. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 6@CoverosGene Security Testing • Often put off until late or ignored completely Fix security issues and delay release? Release on time and accept security risks?
  • 7. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 7@CoverosGene Return on Investment “Security is not an investment that provides a return, like a new factory or a financial instrument. It's an expense that, hopefully, pays for itself in cost savings. Security is about loss prevention, not about earnings. The term just doesn't make sense in this context.” -- Bruce Schneier, Schneier on Security https://www.schneier.com/blog/archives/2008/09/security_roi_1.html
  • 8. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 8@CoverosGene Security in the Delivery Pipeline
  • 9. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 9@CoverosGene Security Tools “If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” -- Bruce Schneier, Secrets & Lies
  • 10. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 10@CoverosGene Security Testing Process 1. Use tools to help detect the obvious security problems 2. Remediate 3. Search for less obvious security problems 4. Repeat Better security process Fewer obvious security issues Better security Time to find less obvious security issues
  • 11. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 11@CoverosGene Incorporate Security Testing Do just enough of each type of testing early in the pipeline to determine if further testing is justified.
  • 12. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 12@CoverosGene Tools to Consider Adding to the Process
  • 13. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 13@CoverosGene It is easier to protect less mvn dependency:tree mvn dependency:analyze mvn com.ning.maven.plugins: maven-dependency-versions-check-plugin
  • 14. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 14@CoverosGene Poor quality code is harder to maintain … and harder to secure
  • 15. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 15@CoverosGene Make sure your tests actually test
  • 16. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 16@CoverosGene Keep libraries up-to-date
  • 17. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 17@CoverosGene Negative testing User role testing … what should users not be able to do?
  • 18. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 18@CoverosGene Use a proxy OWASP ZAP … and piggy-back on functional tests passive proxy active scanner fuzzer
  • 19. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 19@CoverosGene Repeatable, reliable deployments … and test that through practice
  • 20. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 20@CoverosGene Audit yourself
  • 21. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 21@CoverosGene Scan the web application
  • 22. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 22@CoverosGene Scan the web server configuration
  • 23. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 23@CoverosGene Scan the system … before and after installing software
  • 24. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 24@CoverosGene Scan all the systems … don’t forget the infrastructure
  • 25. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 25@CoverosGene Keep packages up-to-date
  • 26. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 26@CoverosGene Test performance … even if you just watch the trends
  • 27. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 27@CoverosGene Test the database … for security and performance
  • 28. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 28@CoverosGene Protect against hackers … even on development and test systems
  • 29. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 29@CoverosGene Continuously improve A little better is still better. Keep improving. … and don’t expect perfectly secure
  • 30. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 30@CoverosGene Find more tools
  • 31. © COPYRIGHT 2016 COVEROS, INC. ALL RIGHTS RESERVED. 31@CoverosGene Questions? Gene Gotimer gene.gotimer@coveros.com @CoverosGene