SlideShare a Scribd company logo
Building your
cybersecurity stack with
Open-Source
HECTOR ERYX PAREDES CAMACHO
TECH MANAGER @ HELIX RE
UNIDOS COMPARTIENDO Y APRENDIENDO
#SGVIRTUAL
AND CONTRIBUTE TO A SAFER WORLD
Open Source México
Advocates of “OpenSourceFirst”
culture to increase innovation and
economic growth at Mexico
Open Source México
Join us !
• Monthly meet ups
• Upcoming Events
• Networking
• News
Networks:
https://twitter.com/amigososom
https://www.linkedin.com/groups/12137251/
https://www.instagram.com/opensourcemexico/
https://github.com/orgs/OpenSOurceMexico/teams
https://www.meetup.com/Open-SOurce-Mexico-OSOM/
https://www.facebook.com/OSOM-Open-Source-Mexico-354538278660417
CCOSS
Cumbre contribuidores
opensource
https://sg.com.mx/buzz/asi-fue-la-
1er-cumbre-de-contribuidores-de-
open-source-software
What you should take in the
next 50 minutes:
• NO MATTER HOW HARD IT COULD
LOOK, YOU SHOULD BE AWARE OF
INFORMATION SECURITY TOOLS,
FRAMEWORKS AND PROCESSES TO
PROTECT YOURSELF AND YOUR
ORGANIZATION
Topics
☛ Cybersecurity
☛ Open Source and how it works
☛ Tools
☛ How to decide
Cybersecurity
Defining
Cybersecurity is
hard
Context is important.
Requires deep understanding of
core concepts like:
• Authorization
• Confidentiality
• Integrity
• Availability
Sources:
https://www.enisa.europa.eu/publications/definition-of-cybersecurity
https://csrc.nist.gov/glossary/term/cybersecurity
• The prevention of damage to, unauthorized use of, exploitation
of, and—if needed—the restoration of electronic information and
communications systems, and the information they contain, in
order to strengthen the confidentiality, integrity and availability
of these systems.
• The process of protecting information by preventing, detecting,
and responding to attacks
Implementing Cybersecurity is
harder…
Cybersecurity example (A)
“…We’ve been alerted that portions of the PHPBB user table
from our forums showed up in a leaked data
collection…includes usernames, email addresses, salted,
hashed passwords….”
BTW, they were using phpBB 3.1, an OpenSource forum
board.
The attack could be mitigated using an updated version of
phpBB.
Source: https://ethhack.com/2019/09/xkcd-forum-hacked-over-562000-users-account-details-leaked/
Cybersecurity example (B)
Mexico's Pemex Oil Suffers Ransomware Attack, $4.9 Million
Demanded
“Security researchers were able to find the malware sample
which confirms the DoppelPaymer infection
…Pemex was probably targeted by an initial infection of
the Emotet Trojan which eventually provided network
access…then have used Cobalt Strike and PowerShell Empire to
spread the ransomware…”
Emotet uses a modular based architecture which includes open
source tools. Signatures of Emotet botnet can be found by the
Cuckosanbox open source malware analysis tool.
Source: https://www.bleepingcomputer.com/news/security/mexicos-pemex-oil-suffers-ransomware-attack-49-million-demanded/
Cybersecurity example (C)
A case study in industry collaboration: Poisoned RDP
vulnerability disclosure and response
“In his research into reverse RDP attacks, Eyal Itkin found that
for mstsc.exe, this technique, also referred to as lazy lateral
movement, was possible through the clipboard sharing channel.”
“Check Point Research recently discovered multiple
vulnerabilities in (RDP) that would allow a malicious actor to
reverse the usual direction of communication and infect the IT
professional…
There are also some popular open-source clients for the RDP
protocol that are used mainly by Linux and Mac users.”
Source:
https://www.microsoft.com/security/blog/2019/08/07/a-case-study-in-industry-collaboration-poisoned-rdp-vulnerability-disclosure-and-response/
https://research.checkpoint.com/2019/reverse-rdp-attack-code-execution-on-rdp-clients/
Common Denominator
Popular website
• Forum
• Opensource tool
• Non patched
Large corporation
• Spear phishing
• Established foothold
• Install ransomware
• Known malware
signatures
• Opensource modules
• Public signatures
opensource
Windows Remote
Desktop Protocol
• Enterprise client
analyzed
• Opensource clients
analyzed
• Static Analysis to
identify vulnerabilities
(free) Open Source
Software
Construye tu stack de ciberseguridad con open source
FOSS is…
Collaboration
Openness
Meritocracy
Born in hacking culture
THE Hacking Culture
particularly creative people who define themselves partly by rejection of ‘normal’
values and working habits
a subculture of individuals who enjoy the intellectual challenge of creatively
overcoming limitations of software systems to achieve novel and clever outcomes
a manner in which it is done and whether it is something exciting and meaningful
Source:
https://en.wikipedia.org/wiki/Hacker_culture
http://catb.org/jargon/html/introduction.html <- PLEASE READ THIS BOOK, “THE CATHEDRAL AND THE BAZAAR BY ERIC. S RAYMOND
Cyber Security community embraces
Collaboration
Openness
Meritocracy
DERIVED ON IT’S HACKING SUBCULTURE(S)
How to choose the right
tool for the right job
HUGE HUGE HUGE LIST OF FOSS
TOOLS ON CYBERSEC
This Photo by Unknown Author is licensed under CC BY-NC-ND
Where to find
OpenSource
security tools
GitHub / Gitlab
Sourceforge
Academic institutions
Carnegie Mellon University SEI:
https://www.sei.cmu.edu/publications/sof
tware-tools/
Organizations promoting
Security
OWASP: https://owasp.org
National Security Agency:
https://github.com/nationalsecurityagency
Within Enterprise Security
Tools
Some products are based on Core Open
Source projects
Now: Let Me Google That For You
•Intrusion
Protection System
Snort
•Original engine of
Nessus Network
Scanner
OpenVAS
•The good old
school network
scanner
Nmap
•Community
version of Nagios
network/infra
monitor
Nagios
Core
•Simulate MITM
attacks
Ettercap
•Simulate a Breach
and Attack
scenario with
super GUI
Infection
Monkey
•Framework to
automate
vulnerabilities
testing (EXPLOITS)
Metasploit
•Malware Analysis
sandbox
Cuckoo
Sandbox
•GUI Forensic tools
for HD
Autopsy
•List Unix tools,
versions and
vulnerabilities
Lynis
Source:https://www.darkreading.com/threat-intelligence/10-open-source-security-tools-you-should-know/d/d-id/1331913
For the
Hoody h4x0r
on the room
Join:
https://t.me/bugbountyes
OWASP Zed Attack Proxy Project
The OWASP Zed Attack Proxy (ZAP) is one of
the world’s most popular free security.
Can help to automatically find security
vulnerabilities web applications.
• Possibly to integrate it in a CI/CD pipeline
Great tool for experienced pen testers to
use for manual security testing.
SAST
Static Application Security Testing
https://snyk.io/
https://www.sonarqube.org/sonarqube-8-0/
https://docs.renovatebot.com/
https://github.com/archerysec
https://github.com/hawkeyesec
https://coreos.com/clair/docs/latest/
https://www.whitesourcesoftware.com/open-source-security/
Source:https://blog.vulcan.io/vulnerability-remediation-in-the-ci-cd-pipeline-not-just-a-coding-issue
Disclamer: Not all these tools are open source, but most of them are offered freely for opensource projects
WITH SO MANY
OPTIONS, WHAT CAN I
DO!
HOW TO DECIDE
Define GOAL & Expected OUTCOME
What is the purpose of :
Scanning your code
Analyzing your dependencies
Running a vulnerability proxy
Scan your network
Scan endpoints/devices
Monitor your network traffic
Run a forensic analysis on a HDD
Add a key management tool
Results must become deliverables with
Quantifiable data
Baselining Key Performance Indicators
Useful for security audits & compliance
Tailored to the cybersecurity landscape of the
systems
• Retro feedback Threat & Risk Analysis
Training
Comprehensive official documentation (contributors love
documenting, right?)
Find the creators
Check if they are open to help
Github issues are a great way to learn
StackOverflow…
Blog posts
YouTube videos
BOOKS O’Reilly has a huge library of books covering
how-to on many open source tools
From time to time companies or individuals close to the project
provide on-site/on-line training: got for it!
Features
Need a GUI?
Need a CLI?
Integration Matches the current CI/CD
pipeline
Reports
Single run
Historical data
Extensible
Plugin architecture
Modular architecture
Codebase easy to maintain
Support
Remember, must open source license provide
no warranty
Only community support
Supported by a
company
Premium support available
Is it an active
community?
Check if there are recent commits
Communication channels
•Slack
•Mailing lists
•Github issues
Integration
Strategy 1: Pre Commit
Hooks
Strategy 2: On Artifact
Build
Strategy 3: On Deploy to
lower environments
Using a mix
of strategies
can leverage
multiple
benefits
BUT… might require larger
maintenance, extra resources ($),
increased complexity
Most security
tools can be
integrated with
a CI/CD pipeline
Scanners can be configured to run automatically on
cloud/on-premise infrastructure
Thank you!

More Related Content

PPTX
Maven Nexus
PDF
CNCF Webinar Series: "Creating an Effective Developer Experience on Kubernetes"
PDF
White Paper: Concepts and Benefits of Repository Management
PDF
Enabling Cloud Native Buildpacks for Windows Containers
PPTX
The Tao of Docker - ITES 2018
PPT
Presentation 1 open source tools in continuous integration environment v1.0
PPTX
4 Outcomes of an Advanced Repo Manager Strategy
PDF
Openbar 7 - Leuven - OpenShift - The Enterprise Container Platform - Piros
Maven Nexus
CNCF Webinar Series: "Creating an Effective Developer Experience on Kubernetes"
White Paper: Concepts and Benefits of Repository Management
Enabling Cloud Native Buildpacks for Windows Containers
The Tao of Docker - ITES 2018
Presentation 1 open source tools in continuous integration environment v1.0
4 Outcomes of an Advanced Repo Manager Strategy
Openbar 7 - Leuven - OpenShift - The Enterprise Container Platform - Piros

What's hot (20)

PDF
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
PDF
DevOps Indonesia #5 - The Future of Containers
PPTX
Docker, the Future of Distributed Applications | Docker Tour de France 2014
PPTX
Continuous integration
PPTX
Cloud Collaboration with Eclipse Che
DOCX
sahithi_Build_Release_Resume
PDF
Play 2 Java Framework with TDD
DOCX
Sai krishna
PDF
Protecting your organization against attacks via the build system
PDF
Resume ram-krishna
PPTX
SanDiego_DevOps_Meetup_9212016-v8
PPTX
Using Open Source and Open Standards in the Platform game
DOCX
PPTX
Top 5 benefits of docker
PDF
Introduction to Docker - Learning containerization XP conference 2016
PPTX
Microsoft Azure in der Praxis
PDF
Micro Frontend Platforms for Kubernetes
PDF
OpenShift As A DevOps Platform
PPTX
Leveraging Nexus Repository Manager at the Heart of DevOps
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
DevOps Indonesia #5 - The Future of Containers
Docker, the Future of Distributed Applications | Docker Tour de France 2014
Continuous integration
Cloud Collaboration with Eclipse Che
sahithi_Build_Release_Resume
Play 2 Java Framework with TDD
Sai krishna
Protecting your organization against attacks via the build system
Resume ram-krishna
SanDiego_DevOps_Meetup_9212016-v8
Using Open Source and Open Standards in the Platform game
Top 5 benefits of docker
Introduction to Docker - Learning containerization XP conference 2016
Microsoft Azure in der Praxis
Micro Frontend Platforms for Kubernetes
OpenShift As A DevOps Platform
Leveraging Nexus Repository Manager at the Heart of DevOps
Ad

Similar to Construye tu stack de ciberseguridad con open source (20)

PPTX
Building your Open Source Security stack
PPTX
Blue Teaming on a Budget of Zero
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PPTX
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
PPTX
Introduction To Ethical Hacking
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PDF
01_Metasploit - The Elixir of Network Security
PPTX
Introduction to cyber security
PPTX
A new hope for 2023? What developers must learn next
PDF
Open Source Cyber Weaponry
PDF
Software Supply Chain Attacks (June 2021)
PPT
cyber sec.ppt
PPT
Ending the Tyranny of Expensive Security Tools: A New Hope
PPTX
Open Source Defense for Edge 2017
PDF
Purple View
PDF
Purple View
PPTX
Continuous security testing - sharing responsibility
PDF
Evolution of Offensive Assessments - RootCon
PPTX
Securing the Web @DevDay Da Nang 2018
PPTX
[DevDay2018] Securing the Web - By Sumanth Damarla, Tech Speaker at Mozilla
Building your Open Source Security stack
Blue Teaming on a Budget of Zero
FBI & Secret Service- Business Email Compromise Workshop
GIDS-2023 A New Hope for 2023? What Developers Must Learn Next
Introduction To Ethical Hacking
FBI & Secret Service- Business Email Compromise Workshop
01_Metasploit - The Elixir of Network Security
Introduction to cyber security
A new hope for 2023? What developers must learn next
Open Source Cyber Weaponry
Software Supply Chain Attacks (June 2021)
cyber sec.ppt
Ending the Tyranny of Expensive Security Tools: A New Hope
Open Source Defense for Edge 2017
Purple View
Purple View
Continuous security testing - sharing responsibility
Evolution of Offensive Assessments - RootCon
Securing the Web @DevDay Da Nang 2018
[DevDay2018] Securing the Web - By Sumanth Damarla, Tech Speaker at Mozilla
Ad

More from Software Guru (20)

PDF
Hola Mundo del Internet de las Cosas
PDF
Estructuras de datos avanzadas: Casos de uso reales
PPTX
Building bias-aware environments
PDF
El secreto para ser un desarrollador Senior
PDF
Cómo encontrar el trabajo remoto ideal
PDF
Automatizando ideas con Apache Airflow
PPTX
How thick data can improve big data analysis for business:
PDF
Introducción al machine learning
PDF
Democratizando el uso de CoDi
PDF
Gestionando la felicidad de los equipos con Management 3.0
PDF
Taller: Creación de Componentes Web re-usables con StencilJS
PPTX
El camino del full stack developer (o como hacemos en SERTI para que no solo ...
PDF
¿Qué significa ser un programador en Bitso?
PDF
Colaboración efectiva entre desarrolladores del cliente y tu equipo.
PDF
Pruebas de integración con Docker en Azure DevOps
PDF
Elixir + Elm: Usando lenguajes funcionales en servicios productivos
PDF
Así publicamos las apps de Spotify sin stress
PPTX
Achieving Your Goals: 5 Tips to successfully achieve your goals
PDF
Acciones de comunidades tech en tiempos del Covid19
PDF
De lo operativo a lo estratégico: un modelo de management de diseño
Hola Mundo del Internet de las Cosas
Estructuras de datos avanzadas: Casos de uso reales
Building bias-aware environments
El secreto para ser un desarrollador Senior
Cómo encontrar el trabajo remoto ideal
Automatizando ideas con Apache Airflow
How thick data can improve big data analysis for business:
Introducción al machine learning
Democratizando el uso de CoDi
Gestionando la felicidad de los equipos con Management 3.0
Taller: Creación de Componentes Web re-usables con StencilJS
El camino del full stack developer (o como hacemos en SERTI para que no solo ...
¿Qué significa ser un programador en Bitso?
Colaboración efectiva entre desarrolladores del cliente y tu equipo.
Pruebas de integración con Docker en Azure DevOps
Elixir + Elm: Usando lenguajes funcionales en servicios productivos
Así publicamos las apps de Spotify sin stress
Achieving Your Goals: 5 Tips to successfully achieve your goals
Acciones de comunidades tech en tiempos del Covid19
De lo operativo a lo estratégico: un modelo de management de diseño

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
cuic standard and advanced reporting.pdf

Construye tu stack de ciberseguridad con open source

  • 1. Building your cybersecurity stack with Open-Source HECTOR ERYX PAREDES CAMACHO TECH MANAGER @ HELIX RE UNIDOS COMPARTIENDO Y APRENDIENDO #SGVIRTUAL AND CONTRIBUTE TO A SAFER WORLD
  • 2. Open Source México Advocates of “OpenSourceFirst” culture to increase innovation and economic growth at Mexico
  • 3. Open Source México Join us ! • Monthly meet ups • Upcoming Events • Networking • News Networks: https://twitter.com/amigososom https://www.linkedin.com/groups/12137251/ https://www.instagram.com/opensourcemexico/ https://github.com/orgs/OpenSOurceMexico/teams https://www.meetup.com/Open-SOurce-Mexico-OSOM/ https://www.facebook.com/OSOM-Open-Source-Mexico-354538278660417
  • 5. What you should take in the next 50 minutes: • NO MATTER HOW HARD IT COULD LOOK, YOU SHOULD BE AWARE OF INFORMATION SECURITY TOOLS, FRAMEWORKS AND PROCESSES TO PROTECT YOURSELF AND YOUR ORGANIZATION
  • 6. Topics ☛ Cybersecurity ☛ Open Source and how it works ☛ Tools ☛ How to decide
  • 8. Defining Cybersecurity is hard Context is important. Requires deep understanding of core concepts like: • Authorization • Confidentiality • Integrity • Availability Sources: https://www.enisa.europa.eu/publications/definition-of-cybersecurity https://csrc.nist.gov/glossary/term/cybersecurity • The prevention of damage to, unauthorized use of, exploitation of, and—if needed—the restoration of electronic information and communications systems, and the information they contain, in order to strengthen the confidentiality, integrity and availability of these systems. • The process of protecting information by preventing, detecting, and responding to attacks
  • 10. Cybersecurity example (A) “…We’ve been alerted that portions of the PHPBB user table from our forums showed up in a leaked data collection…includes usernames, email addresses, salted, hashed passwords….” BTW, they were using phpBB 3.1, an OpenSource forum board. The attack could be mitigated using an updated version of phpBB. Source: https://ethhack.com/2019/09/xkcd-forum-hacked-over-562000-users-account-details-leaked/
  • 11. Cybersecurity example (B) Mexico's Pemex Oil Suffers Ransomware Attack, $4.9 Million Demanded “Security researchers were able to find the malware sample which confirms the DoppelPaymer infection …Pemex was probably targeted by an initial infection of the Emotet Trojan which eventually provided network access…then have used Cobalt Strike and PowerShell Empire to spread the ransomware…” Emotet uses a modular based architecture which includes open source tools. Signatures of Emotet botnet can be found by the Cuckosanbox open source malware analysis tool. Source: https://www.bleepingcomputer.com/news/security/mexicos-pemex-oil-suffers-ransomware-attack-49-million-demanded/
  • 12. Cybersecurity example (C) A case study in industry collaboration: Poisoned RDP vulnerability disclosure and response “In his research into reverse RDP attacks, Eyal Itkin found that for mstsc.exe, this technique, also referred to as lazy lateral movement, was possible through the clipboard sharing channel.” “Check Point Research recently discovered multiple vulnerabilities in (RDP) that would allow a malicious actor to reverse the usual direction of communication and infect the IT professional… There are also some popular open-source clients for the RDP protocol that are used mainly by Linux and Mac users.” Source: https://www.microsoft.com/security/blog/2019/08/07/a-case-study-in-industry-collaboration-poisoned-rdp-vulnerability-disclosure-and-response/ https://research.checkpoint.com/2019/reverse-rdp-attack-code-execution-on-rdp-clients/
  • 13. Common Denominator Popular website • Forum • Opensource tool • Non patched Large corporation • Spear phishing • Established foothold • Install ransomware • Known malware signatures • Opensource modules • Public signatures opensource Windows Remote Desktop Protocol • Enterprise client analyzed • Opensource clients analyzed • Static Analysis to identify vulnerabilities
  • 17. THE Hacking Culture particularly creative people who define themselves partly by rejection of ‘normal’ values and working habits a subculture of individuals who enjoy the intellectual challenge of creatively overcoming limitations of software systems to achieve novel and clever outcomes a manner in which it is done and whether it is something exciting and meaningful Source: https://en.wikipedia.org/wiki/Hacker_culture http://catb.org/jargon/html/introduction.html <- PLEASE READ THIS BOOK, “THE CATHEDRAL AND THE BAZAAR BY ERIC. S RAYMOND
  • 18. Cyber Security community embraces Collaboration Openness Meritocracy DERIVED ON IT’S HACKING SUBCULTURE(S)
  • 19. How to choose the right tool for the right job
  • 20. HUGE HUGE HUGE LIST OF FOSS TOOLS ON CYBERSEC This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 21. Where to find OpenSource security tools GitHub / Gitlab Sourceforge Academic institutions Carnegie Mellon University SEI: https://www.sei.cmu.edu/publications/sof tware-tools/ Organizations promoting Security OWASP: https://owasp.org National Security Agency: https://github.com/nationalsecurityagency Within Enterprise Security Tools Some products are based on Core Open Source projects
  • 22. Now: Let Me Google That For You •Intrusion Protection System Snort •Original engine of Nessus Network Scanner OpenVAS •The good old school network scanner Nmap •Community version of Nagios network/infra monitor Nagios Core •Simulate MITM attacks Ettercap •Simulate a Breach and Attack scenario with super GUI Infection Monkey •Framework to automate vulnerabilities testing (EXPLOITS) Metasploit •Malware Analysis sandbox Cuckoo Sandbox •GUI Forensic tools for HD Autopsy •List Unix tools, versions and vulnerabilities Lynis Source:https://www.darkreading.com/threat-intelligence/10-open-source-security-tools-you-should-know/d/d-id/1331913
  • 23. For the Hoody h4x0r on the room Join: https://t.me/bugbountyes
  • 24. OWASP Zed Attack Proxy Project The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security. Can help to automatically find security vulnerabilities web applications. • Possibly to integrate it in a CI/CD pipeline Great tool for experienced pen testers to use for manual security testing.
  • 25. SAST Static Application Security Testing https://snyk.io/ https://www.sonarqube.org/sonarqube-8-0/ https://docs.renovatebot.com/ https://github.com/archerysec https://github.com/hawkeyesec https://coreos.com/clair/docs/latest/ https://www.whitesourcesoftware.com/open-source-security/ Source:https://blog.vulcan.io/vulnerability-remediation-in-the-ci-cd-pipeline-not-just-a-coding-issue Disclamer: Not all these tools are open source, but most of them are offered freely for opensource projects
  • 26. WITH SO MANY OPTIONS, WHAT CAN I DO! HOW TO DECIDE
  • 27. Define GOAL & Expected OUTCOME What is the purpose of : Scanning your code Analyzing your dependencies Running a vulnerability proxy Scan your network Scan endpoints/devices Monitor your network traffic Run a forensic analysis on a HDD Add a key management tool Results must become deliverables with Quantifiable data Baselining Key Performance Indicators Useful for security audits & compliance Tailored to the cybersecurity landscape of the systems • Retro feedback Threat & Risk Analysis
  • 28. Training Comprehensive official documentation (contributors love documenting, right?) Find the creators Check if they are open to help Github issues are a great way to learn StackOverflow… Blog posts YouTube videos BOOKS O’Reilly has a huge library of books covering how-to on many open source tools From time to time companies or individuals close to the project provide on-site/on-line training: got for it!
  • 29. Features Need a GUI? Need a CLI? Integration Matches the current CI/CD pipeline Reports Single run Historical data Extensible Plugin architecture Modular architecture Codebase easy to maintain
  • 30. Support Remember, must open source license provide no warranty Only community support Supported by a company Premium support available Is it an active community? Check if there are recent commits Communication channels •Slack •Mailing lists •Github issues
  • 32. Strategy 1: Pre Commit Hooks
  • 33. Strategy 2: On Artifact Build
  • 34. Strategy 3: On Deploy to lower environments
  • 35. Using a mix of strategies can leverage multiple benefits BUT… might require larger maintenance, extra resources ($), increased complexity
  • 36. Most security tools can be integrated with a CI/CD pipeline
  • 37. Scanners can be configured to run automatically on cloud/on-premise infrastructure