SlideShare a Scribd company logo
Shannon Lietz - @devsecops
James Wickett - @wickett
-- FOUNDER --
Shannon Lietz (@devsecops)
2
James Wickett (@wickett)
●
●
●
@devsecops || @wickett3
●
●
●
4
@devsecsops || @wickett5
6 @devsecsops || @wickett
“
massive computer-related attacks
@devsecops || @wickett7
- Steven Bellovin, Thinking Security
8
Adversary Perspective
@devsecsops || @wickett9
Motives
OpportunitiesMeans
@devsecops || @wickett10
DevSecOps: Finding the Adversaries in our Midst
1) understand
2) measure
3) correct continuously
@devsecops || @wickett12
HONEY SCANNERS DETECTION
@devsecops || @wickett13
DevSecOps: Finding the Adversaries in our Midst
@devsecops || @wickett15
Deployment Architecture
Component Manifest
Lines of Code
Tests Applied
@devsecops || @wickett16
@devsecops || @wickett17
@devsecops || @wickett18
“We can see requests getting blocked but we don't
know why. The samples just show the Ruleset name
and not the actual reason for blocking the requests.”
– Anonymous WAF User
@devsecops || @wickett19
OWASP TOP 10 App Sec Risks Real-World Top 10 Attacks
1 Injection Direct Object Reference
2 Broken Authentication Forceful Browsing
3 Sensitive Data Exposure Null Byte Attack
4 XML External Exposures (XXE) Command Injection
5 Broken Access Control Feature Abuse
6 Security Misconfiguration Evasion Techniques
7 Cross Site Scripting Subdomain Takeover
8 Insecure Deserialization Misconfiguration
9 Using Components with Known Vulnerabilities Cross Site Scripting
10 Insufficient Logging/Monitoring SQL Injection
@devsecops || @wickett20
Researchers Paid Noise
Advanced
Adversaries
Scanners
@devsecops || @wickett21
Fame /
Payment
Continuous
Payment
Control /
Payment
Information
Brokerage
@devsecops || @wickett22
OWASP Top 10
Advanced Adversaries
%
Perceived
Success
Number of
Adversaries
+ IPs
Scanners
Researchers
Paid Noise
@devsecops || @wickett23
OWASP Top Ten is just
the most recognized
part of the Problem
You Can’t Secure
New App Tech w/
Legacy AppSec
Account Takeover
Direct Object Reference
Forceful Browsing
Feature Abuse
Evasion Techniques
Subdomain Takeover
Misconfiguration
• Legacy WAFs focus on the
same threats as 15 years ago
• False positives result from generic
signatures without context
• Rarely used in blocking mode
OWASP Injection
Attacks
Real-World Problems
@devsecops || @wickett25
@devsecops || @wickett26
@devsecops || @wickett27
@devsecops || @wickett28
whitelist themselves
don’t use commercial scanners
“goto” TTPs
cryptocurrency
AI/ML
hide
@devsecops || @wickett29
30
31
Every application is different
@devsecops || @wickett
@devsecops || @wickett32
@devsecops || @wickett33
@devsecops || @wickett34
@devsecops || @wickett35
Return Rate
Rate of Change
Cost of fix
Mean Time to Identification
@devsecops || @wickett36
@devsecops || @wickett37
Time
Changes
Security Tests
@devsecops || @wickett38
DevSecOps: Finding the Adversaries in our Midst
• …
•
…
@devsecops || @wickett40
@devsecops || @wickett41
@devsecops || @wickett42
@devsecsops || @wickett43
@devsecsops || @wickett44
Crawl
Walk
Run
@devsecops || @wickett45
46
Free eBook!
info.signalsciences.com/book

More Related Content

PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
Pentest is yesterday, DevSecOps is tomorrow
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PDF
The New Ways of DevSecOps - The Secure Dev 2019
PDF
Maturing DevSecOps: From Easy to High Impact
PPTX
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
PPTX
Defining DevSecOps
PDF
DevSecOps : The Open Source Way by Yusuf Hadiwinata
Devops Indonesia - DevSecOps - The Open Source Way
Pentest is yesterday, DevSecOps is tomorrow
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The New Ways of DevSecOps - The Secure Dev 2019
Maturing DevSecOps: From Easy to High Impact
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
Defining DevSecOps
DevSecOps : The Open Source Way by Yusuf Hadiwinata

What's hot (20)

PDF
DevSecOps: A New Hope for Security in CI/CD
PDF
The Emergent Cloud Security Toolchain for CI/CD
PDF
DevSecOps What Why and How
PDF
Adversary Driven Defense in the Real World
PPTX
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
Talk DevSecOps to me
PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
PDF
Release Your Inner DevSecOp
PPTX
Simplify Dev with Complicated Security Tools
PPTX
DevSecOps reference architectures 2018
PPTX
DevSecOps without DevOps is Just Security
PDF
Serverless Security: A How-to Guide @ SnowFROC 2019
PDF
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
PPTX
DevSecOps Training Bootcamp - A Practical DevSecOps Course
PPTX
ABN AMRO DevSecOps Journey
PDF
Barriers to Container Security and How to Overcome Them
PDF
Introduction to DevSecOps
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PPTX
How to Get Started with DevSecOps
DevSecOps: A New Hope for Security in CI/CD
The Emergent Cloud Security Toolchain for CI/CD
DevSecOps What Why and How
Adversary Driven Defense in the Real World
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
Bridging the Security Testing Gap in Your CI/CD Pipeline
Talk DevSecOps to me
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Release Your Inner DevSecOp
Simplify Dev with Complicated Security Tools
DevSecOps reference architectures 2018
DevSecOps without DevOps is Just Security
Serverless Security: A How-to Guide @ SnowFROC 2019
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
DevSecOps Training Bootcamp - A Practical DevSecOps Course
ABN AMRO DevSecOps Journey
Barriers to Container Security and How to Overcome Them
Introduction to DevSecOps
DevSecOps: essential tooling to enable continuous security 2019-09-16
How to Get Started with DevSecOps
Ad

Similar to DevSecOps: Finding the Adversaries in our Midst (20)

PDF
swampUP - 2018 - The Divine and Felonious Nature of Cyber Security
PDF
Protection and Verification of Security Design Flaws
PDF
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
PDF
Clean Architecture Essentials - Stockholm Software Craftsmanship
PPTX
Performance Metrics Driven CI/CD - Introduction to Continuous Innovation and ...
PDF
The Seven Habits of the Highly Effective DevSecOp
PPTX
OWASP Top 10.pptx for latest security lapses in applications
PDF
Clean Architecture Essentials @ivanpaulovich
PDF
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
PPTX
DevOpsGuys FutureDecoded 2016 - is DevOps the Answer
PDF
Epistemological Problem of Application Security
PPTX
Owasp top 10 Vulnerabilities by cyberops infosec
PDF
OWASP Top 10 2007 for JavaEE
PDF
Trusting Your Ingredients - What Building Software And Cheesecake Have In Common
PDF
Application Security Epistemology in a Continuous Delivery World
PDF
OWASP top10 2017, Montpellier JUG de Noel
PDF
Lessons from the Trenches: Building an API-Centric Architecture
PPTX
Getting CI right for SQL Server
PDF
Meetup DotNetCode Owasp
PPTX
Visual Studio | Lanzamiento VS2017 en Buenos Aires - 11/03/2017
swampUP - 2018 - The Divine and Felonious Nature of Cyber Security
Protection and Verification of Security Design Flaws
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
Clean Architecture Essentials - Stockholm Software Craftsmanship
Performance Metrics Driven CI/CD - Introduction to Continuous Innovation and ...
The Seven Habits of the Highly Effective DevSecOp
OWASP Top 10.pptx for latest security lapses in applications
Clean Architecture Essentials @ivanpaulovich
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
DevOpsGuys FutureDecoded 2016 - is DevOps the Answer
Epistemological Problem of Application Security
Owasp top 10 Vulnerabilities by cyberops infosec
OWASP Top 10 2007 for JavaEE
Trusting Your Ingredients - What Building Software And Cheesecake Have In Common
Application Security Epistemology in a Continuous Delivery World
OWASP top10 2017, Montpellier JUG de Noel
Lessons from the Trenches: Building an API-Centric Architecture
Getting CI right for SQL Server
Meetup DotNetCode Owasp
Visual Studio | Lanzamiento VS2017 en Buenos Aires - 11/03/2017
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Approach and Philosophy of On baking technology
PPTX
1. Introduction to Computer Programming.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
project resource management chapter-09.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
cloud_computing_Infrastucture_as_cloud_p
SOPHOS-XG Firewall Administrator PPT.pptx
Getting Started with Data Integration: FME Form 101
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TLE Review Electricity (Electricity).pptx
Approach and Philosophy of On baking technology
1. Introduction to Computer Programming.pptx
Unlocking AI with Model Context Protocol (MCP)
Heart disease approach using modified random forest and particle swarm optimi...
Zenith AI: Advanced Artificial Intelligence
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Enhancing emotion recognition model for a student engagement use case through...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
project resource management chapter-09.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Mushroom cultivation and it's methods.pdf
Digital-Transformation-Roadmap-for-Companies.pptx

DevSecOps: Finding the Adversaries in our Midst