SlideShare a Scribd company logo
MAKING DEVSECOPS A REALITY
IN YOUR SPRING APPLICATIONS
Roberto Velasco
ABOUT ME
Roberto Velasco
Working as Java Software Architect since 2004
Involved in Software Security since 2001
Hdiv open-source project founder
CEO at Hdiv Security
CONTENTS OF TALK
• Introduction
• Software Security issues
• DevSecOps: Security Bugs
• DevSecOps: Business Logic Flaws
• Summary
THE NEW REALITIES
• New deployments every day
• Moving to the Cloud
• Exponential scalability requirements
• Exposed to automated attacks (low cost attacks)
SECURITY ISSUES IN THAT NEW SCENARIO
• Security teams don’t have enough time to review
the applications manually
• Many security solutions are not adapted to the cloud
• Hardware-based
• Scalability issues
THE SOLUTION: DEVSECOPS
• Security must be integrated within the design
process of the applications
• Security solutions must work within cloud
environments
• We need to follow a DevSecOps approach
HOW TO IMPLEMENT DEVSECOPS
Metrics Tools
SOFTWARE SECURITY ISSUES
• SQL Injection
• Cross-Site Scripting (XSS)
• Directory Traversal
• Weak Crypto Algorithm
• Java Object Deserialization
• etc.
• Access Control
• Binding attacks
• Race condition
• Step N of workflow can be skipped
• etc.
DEVSECOPS:
• Syntax issues related to
security
• They can be detected by tools:
Application Security Testing
(AST)
• AST
• SAST
• DAST
• IAST
• OWASP A1: Injection
• OWASP A2: Broken Authentication
• OWASP A3: Sensitive Data Exposure
• OWASP A4: XML External Entities (XXE)
• OWASP A6: Security Misconfiguration
• OWASP A7: XSS
• OWASP A8: Insecure Deserialization
• OWASP A8 (2013): Cross-Site Request Forgery (CSRF)
• OWASP A9: Using Components with Known Vulnerabilities
SECURITY BUGS
1. Use an AST solution during development
2. Define metrics and thresholds to assure quality
3. Integrate security issues within your issue tracker
4. Monitor and protect production deployments
DEVSECOPS: SECURITY BUGS HOW TO
DEMO
https://hdivsecurity.com/videos/devsecops-security-bugs
Automated AST is not a panacea though. All of the AST tools
share significant weakness in the area of detecting business
logic flaws as well as more deliberate, malicious flaws like logic
bombs and back doors. Business logic flaws include
vulnerabilities like insecure direct object reference, which can
lead to account compromise or privilege escalation.
A Guidance Framework for Establishing and
Maturing an Application Security Program
DEVSECOPS:
• OWASP A4 (2013): Insecure Direct Object References
• OWASP A7 (2013): Missing Function Level Access Control
• OWASP A10 (2013): Unvalidated Redirects andForwards
• OWASP A5 (2017): Broken Access Control
BUSINESS LOGIC FLAWS
• Access control
• Binding attacks
• Race condition
• Step N of workflow can
be skipped
• etc.
DEMO
• URL DIRECT ACCESS
• PARAMETER MANIPULATION
• MISSING FUNCTION LEVEL ACCESS CONTROL
• BINDING ISSUE
https://hdivsecurity.com/videos/devsecops-business-logic-flaws
• Even though they can’t be detected automatically,
we can automated the protection
• Business logic flaws protection can be automated
through input validation
• We can measure the quality of the protection
DEVSECOPS: BUSINESS LOGIC FLAWS & SOLUTION
• Input
• URLs
• HTTP form Parameters
• JSON attributes (REST apps)
• Validations that we usually perform manually
• Type
• Size
• Role based
• Custom code validation
DEVSECOPS: BUSINESS LOGIC FLAWS & SOLUTION
DEVSECOPS: BUSINESS LOGIC FLAWS & SOLUTION
• Traditional security validations (format & role)
present important limitations
• http://www.bank.com?id=123456789012345
• Security depends on people
How to automate protection?
We can apply contract based protection
DEVSECOPS: BUSINESS LOGIC FLAWS
DEVSECOPS: BUSINESS LOGIC FLAWS
DEVSECOPS: BUSINESS LOGIC FLAWS
public class Pet {
Integer id;
id;
String name;
Date birthDate;
PetType typeId;
Breed breed;
Color color;
}
DEVSECOPS: BUSINESS LOGIC FLAWS
public class Pet {
Integer id;
id;
@Pattern(regexp=“^[A-Za-z0-9]*$”)
String name;
Date birthDate;
PetType typeId;
Breed breed;
Color color;
}
How do we implement this?
The server must define what is allowed,
rejecting the rest
DEVSECOPS: BUSINESS LOGIC FLAWS
1
2
Validation Filter
Libraries Extension2
DEVSECOPS: BUSINESS LOGIC FLAWS
DEMO
BUSINESS LOGIC FLAWS PROTECTION
https://hdivsecurity.com/videos/devsecops-business-logic-flaws-protection
• Using contract enforcement we can
measure the quality of the input validation
• We know how much of the input is validated
using:
• Integrity
• Basic input validation (format, size, etc.)
• Nothing at all
DEVSECOPS: BUSINESS LOGIC FLAWS & METRICS
DEMO
VISUALIZING VALIDATIONS QUALITY
https://hdivsecurity.com/videos/devsecops-validations-quality-visualization
• Define thresholds depending your maturity
model
DEVSECOPS: BUSINESS LOGIC FLAWS & METRICS
DEMO
BUSINESS LOGIC FLAWS – CI (JENKINS)
https://hdivsecurity.com/videos/devsecops-business-logic-flaws-continuous-integration
SUMMARY
• DevSecOps approach must be complete, not only
focused on Security Bugs
• We need tools that work in all environments
offering:
• Metrics generation and enforcement
• Automation of protection and monitoring
THANKS!
Q & A
Roberto Velasco

More Related Content

PDF
Protection and Verification of Security Design Flaws
PPTX
Making Security Agile
PPTX
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PDF
Shift Left Security
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PPTX
AllDayDevOps 2019 AppSensor
Protection and Verification of Security Design Flaws
Making Security Agile
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
SecDevOps 2.0 - Managing Your Robot Army
Shift Left Security
Security in CI/CD Pipelines: Tips for DevOps Engineers
[OPD 2019] Governance as a missing part of IT security architecture
AllDayDevOps 2019 AppSensor

What's hot (20)

PDF
Top API Security Issues Found During POCs
PDF
"CERT Secure Coding Standards" by Dr. Mark Sherman
PDF
DevSecOps | DevOps Sec
PDF
Why Security Engineer Need Shift-Left to DevSecOps?
PDF
Threat modeling with architectural risk patterns
PDF
Veracode Automation CLI (using Jenkins for SDL integration)
PDF
Security champions v1.0
PPTX
Integrating security into Continuous Delivery
PPTX
Continuous and Visible Security Testing with BDD-Security
PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
Secure coding practices
PPTX
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
PPTX
Security as a new metric for Business, Product and Development Lifecycle
PDF
Legacy-SecDevOps (AppSec Management Debrief)
PPTX
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
PDF
DevSecOps, The Good, Bad, and Ugly
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PDF
Security in a Continuous Delivery World
PPTX
AppSec California 2016 - Making Security Agile
Top API Security Issues Found During POCs
"CERT Secure Coding Standards" by Dr. Mark Sherman
DevSecOps | DevOps Sec
Why Security Engineer Need Shift-Left to DevSecOps?
Threat modeling with architectural risk patterns
Veracode Automation CLI (using Jenkins for SDL integration)
Security champions v1.0
Integrating security into Continuous Delivery
Continuous and Visible Security Testing with BDD-Security
Implementing an Application Security Pipeline in Jenkins
Secure coding practices
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
Security as a new metric for Business, Product and Development Lifecycle
Legacy-SecDevOps (AppSec Management Debrief)
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
DevSecOps, The Good, Bad, and Ugly
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Security in a Continuous Delivery World
AppSec California 2016 - Making Security Agile
Ad

Similar to Making DevSecOps a Reality in your Spring Applications (20)

PPTX
HouSecCon 2019: Offensive Security - Starting from Scratch
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PDF
App sec and quality london - may 2016 - v0.5
PDF
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
PDF
SC conference - Building AppSec Teams
PPTX
Security engineering 101 when good design & security work together
PDF
AppSec in an Agile World
PPTX
Secure App Aspirations: Why it is very difficult in the real world
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
DevSecOps | How hard it is?
PDF
Devoxx UK 2022 - Application security: What should the attack landscape look ...
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
AppSec How-To: Achieving Security in DevOps
PPTX
DevSecOps without DevOps is Just Security
PDF
SecDevOps for API Security
PDF
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
PPTX
Web security – everything we know is wrong cloud version
PDF
Security Checkpoints in Agile SDLC
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
HouSecCon 2019: Offensive Security - Starting from Scratch
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
App sec and quality london - may 2016 - v0.5
apidays LIVE New York 2021 - Why Software Teams Struggle with API Security Te...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
SC conference - Building AppSec Teams
Security engineering 101 when good design & security work together
AppSec in an Agile World
Secure App Aspirations: Why it is very difficult in the real world
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
DevSecOps | How hard it is?
Devoxx UK 2022 - Application security: What should the attack landscape look ...
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
AppSec How-To: Achieving Security in DevOps
DevSecOps without DevOps is Just Security
SecDevOps for API Security
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Web security – everything we know is wrong cloud version
Security Checkpoints in Agile SDLC
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Ad

Recently uploaded (20)

PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Introduction to Artificial Intelligence
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
L1 - Introduction to python Backend.pptx
PPT
Introduction Database Management System for Course Database
PDF
medical staffing services at VALiNTRY
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
System and Network Administration Chapter 2
PDF
Digital Strategies for Manufacturing Companies
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Odoo Companies in India – Driving Business Transformation.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
CHAPTER 2 - PM Management and IT Context
Introduction to Artificial Intelligence
VVF-Customer-Presentation2025-Ver1.9.pptx
How to Migrate SBCGlobal Email to Yahoo Easily
Navsoft: AI-Powered Business Solutions & Custom Software Development
L1 - Introduction to python Backend.pptx
Introduction Database Management System for Course Database
medical staffing services at VALiNTRY
How to Choose the Right IT Partner for Your Business in Malaysia
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Reimagine Home Health with the Power of Agentic AI​
Design an Analysis of Algorithms II-SECS-1021-03
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
System and Network Administration Chapter 2
Digital Strategies for Manufacturing Companies
2025 Textile ERP Trends: SAP, Odoo & Oracle
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)

Making DevSecOps a Reality in your Spring Applications

  • 1. MAKING DEVSECOPS A REALITY IN YOUR SPRING APPLICATIONS Roberto Velasco
  • 2. ABOUT ME Roberto Velasco Working as Java Software Architect since 2004 Involved in Software Security since 2001 Hdiv open-source project founder CEO at Hdiv Security
  • 3. CONTENTS OF TALK • Introduction • Software Security issues • DevSecOps: Security Bugs • DevSecOps: Business Logic Flaws • Summary
  • 4. THE NEW REALITIES • New deployments every day • Moving to the Cloud • Exponential scalability requirements • Exposed to automated attacks (low cost attacks)
  • 5. SECURITY ISSUES IN THAT NEW SCENARIO • Security teams don’t have enough time to review the applications manually • Many security solutions are not adapted to the cloud • Hardware-based • Scalability issues
  • 6. THE SOLUTION: DEVSECOPS • Security must be integrated within the design process of the applications • Security solutions must work within cloud environments • We need to follow a DevSecOps approach
  • 7. HOW TO IMPLEMENT DEVSECOPS Metrics Tools
  • 8. SOFTWARE SECURITY ISSUES • SQL Injection • Cross-Site Scripting (XSS) • Directory Traversal • Weak Crypto Algorithm • Java Object Deserialization • etc. • Access Control • Binding attacks • Race condition • Step N of workflow can be skipped • etc.
  • 9. DEVSECOPS: • Syntax issues related to security • They can be detected by tools: Application Security Testing (AST) • AST • SAST • DAST • IAST • OWASP A1: Injection • OWASP A2: Broken Authentication • OWASP A3: Sensitive Data Exposure • OWASP A4: XML External Entities (XXE) • OWASP A6: Security Misconfiguration • OWASP A7: XSS • OWASP A8: Insecure Deserialization • OWASP A8 (2013): Cross-Site Request Forgery (CSRF) • OWASP A9: Using Components with Known Vulnerabilities SECURITY BUGS
  • 10. 1. Use an AST solution during development 2. Define metrics and thresholds to assure quality 3. Integrate security issues within your issue tracker 4. Monitor and protect production deployments DEVSECOPS: SECURITY BUGS HOW TO
  • 12. Automated AST is not a panacea though. All of the AST tools share significant weakness in the area of detecting business logic flaws as well as more deliberate, malicious flaws like logic bombs and back doors. Business logic flaws include vulnerabilities like insecure direct object reference, which can lead to account compromise or privilege escalation. A Guidance Framework for Establishing and Maturing an Application Security Program
  • 13. DEVSECOPS: • OWASP A4 (2013): Insecure Direct Object References • OWASP A7 (2013): Missing Function Level Access Control • OWASP A10 (2013): Unvalidated Redirects andForwards • OWASP A5 (2017): Broken Access Control BUSINESS LOGIC FLAWS • Access control • Binding attacks • Race condition • Step N of workflow can be skipped • etc.
  • 14. DEMO • URL DIRECT ACCESS • PARAMETER MANIPULATION • MISSING FUNCTION LEVEL ACCESS CONTROL • BINDING ISSUE https://hdivsecurity.com/videos/devsecops-business-logic-flaws
  • 15. • Even though they can’t be detected automatically, we can automated the protection • Business logic flaws protection can be automated through input validation • We can measure the quality of the protection DEVSECOPS: BUSINESS LOGIC FLAWS & SOLUTION
  • 16. • Input • URLs • HTTP form Parameters • JSON attributes (REST apps) • Validations that we usually perform manually • Type • Size • Role based • Custom code validation DEVSECOPS: BUSINESS LOGIC FLAWS & SOLUTION
  • 17. DEVSECOPS: BUSINESS LOGIC FLAWS & SOLUTION • Traditional security validations (format & role) present important limitations • http://www.bank.com?id=123456789012345 • Security depends on people
  • 18. How to automate protection? We can apply contract based protection DEVSECOPS: BUSINESS LOGIC FLAWS
  • 20. DEVSECOPS: BUSINESS LOGIC FLAWS public class Pet { Integer id; id; String name; Date birthDate; PetType typeId; Breed breed; Color color; }
  • 21. DEVSECOPS: BUSINESS LOGIC FLAWS public class Pet { Integer id; id; @Pattern(regexp=“^[A-Za-z0-9]*$”) String name; Date birthDate; PetType typeId; Breed breed; Color color; }
  • 22. How do we implement this? The server must define what is allowed, rejecting the rest DEVSECOPS: BUSINESS LOGIC FLAWS
  • 24. DEMO BUSINESS LOGIC FLAWS PROTECTION https://hdivsecurity.com/videos/devsecops-business-logic-flaws-protection
  • 25. • Using contract enforcement we can measure the quality of the input validation • We know how much of the input is validated using: • Integrity • Basic input validation (format, size, etc.) • Nothing at all DEVSECOPS: BUSINESS LOGIC FLAWS & METRICS
  • 27. • Define thresholds depending your maturity model DEVSECOPS: BUSINESS LOGIC FLAWS & METRICS
  • 28. DEMO BUSINESS LOGIC FLAWS – CI (JENKINS) https://hdivsecurity.com/videos/devsecops-business-logic-flaws-continuous-integration
  • 29. SUMMARY • DevSecOps approach must be complete, not only focused on Security Bugs • We need tools that work in all environments offering: • Metrics generation and enforcement • Automation of protection and monitoring