SlideShare a Scribd company logo
AST Platform
And the importance of multi layered
application security testing
About Me
Uria Ankorion
Appsec solutions expert @ Checkmarx
• Strong believer in spreading security awareness
• Software developer at heart
CSC 18
Application Security
Application Security and its importance
...THEN
SUDDENLY…
SOFTWARE
SECURITY
HAS BECOME ATOP
PRIORITY
So which tool should I use?..(hint: as many as you can)
Application Security Technologies
SAST – Static Application Security Testing
IAST – Interactive Application Security Testing
SCA/OSA – Software Composition Analysis
DAST – Dynamic Application Security Testing
RASP – Runtime Application Self Protection
WAF – Web Application Firewall
Static Application Security Testing (SAST)
Interactive Application Security Testing (IAST)
Runtime
App Server
Frameworks
Libraries
Custom Code
IAST Agent
Application Under Test
Testing
Framework
IAST server
IAST Dashboard
1
Monitoring of
Application Under
Test
2
Event-Collection
during Testing
3
Security-Queries
Execution
4
Pushing
Vulnerabilities
to the Dashboard
Identify OS libraries metadata,
vulnerabilities, licenses
3
Send list of potential OS
dependencies
2
Generate report
4
Scan project sources and run
dependency resolution
1
Customer's libraries
(source code + binary files)
Customer’s open source
libraries
Repository of Open Source
libraries
Cloud
Service
Software Composition Anaysis (SCA aka OSA)
Dynamic Application Security Testing (DAST)
AppSec Technique Advantages Disadvantages
SAST
• Can be used after 1st line of code is written – max
Shift Left
• Makes the vulnerability fixing easy by showing the
problem in the source code
• Produces fast results even for large applications
• Can be easily integrated into the CI process
• Cannot see all flows, e.g. because of user data
dependencies
• Requires continuous development for new
language/framework support
• May require fine tuning to accommodate for custom
sanitisers and services
DAST
• Provides visual confirmation for vulnerabilities
• Doesn’t require access to source code to produce
results
• Requires a functional application
• Can only detect reflected vulnerabilities
• Takes a lot of time to generate and execute all inputs
• Is difficult to integration into the CI process
• Shows there is a problem, doesn’t tell where it is in
the code
IAST
• Provides immediate feedback when suspected
vulnerabilities are found
• Doesn’t require access to source code to produce
results
• Can be integrated into the CI process
• Requires a functional application
• Requires existing (preferably automated and
comprehensive) functional testing suite
• Highly dependent on the application technology
DeployTestBuildDevelopment
DevOps
SAST
SCA/OSA
IAST
Dev
SAST
PLATFORM
TICKETING
REMEDIATION
SCA IAST DAST
Commit
Or
Pull request
IssuesIssues
Issues
Issues
Automation, automation, automation..
[OPD 2019]  AST Platform and the importance of multi-layered application security testing
Thank you
Stay SAFE
uria.ankorion@checkmarx.com

More Related Content

PPTX
[OPD 2019] Inter-application vulnerabilities
PDF
[OPD 2019] Governance as a missing part of IT security architecture
PDF
[OPD 2019] Top 10 Security Facts of 2020
PDF
[OPD 2019] Life after pentest
PDF
[OPD 2019] Web Apps vs Blockchain dApps
PPTX
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
PDF
we45 - Web Application Security Testing Case Study
PDF
[OPD 2019] Threat modeling at scale
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Life after pentest
[OPD 2019] Web Apps vs Blockchain dApps
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
we45 - Web Application Security Testing Case Study
[OPD 2019] Threat modeling at scale

What's hot (20)

PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PPTX
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
PDF
Top API Security Issues Found During POCs
PDF
Beyond the mcse red teaming active directory
PDF
The Dev, Sec and Ops of API Security - API World
PPTX
Security testing fundamentals
PPTX
Application Security Logging with Splunk using Java
PDF
Injecting Security into vulnerable web apps at Runtime
PDF
API Security: the full story
PPTX
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
PDF
WEBINAR: OWASP API Security Top 10
PDF
Injecting Security into Web apps at Runtime Whitepaper
PDF
The Dev, Sec and Ops of API Security - NordicAPIs
PDF
OWASP API Security TOP 10 - 2019
PDF
API Security in a Microservices World
PPTX
How to Test for The OWASP Top Ten
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
PPTX
OWASP TOP 10
PDF
Application Security Workshop
PDF
Web Application Security 101
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Top API Security Issues Found During POCs
Beyond the mcse red teaming active directory
The Dev, Sec and Ops of API Security - API World
Security testing fundamentals
Application Security Logging with Splunk using Java
Injecting Security into vulnerable web apps at Runtime
API Security: the full story
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
WEBINAR: OWASP API Security Top 10
Injecting Security into Web apps at Runtime Whitepaper
The Dev, Sec and Ops of API Security - NordicAPIs
OWASP API Security TOP 10 - 2019
API Security in a Microservices World
How to Test for The OWASP Top Ten
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
OWASP TOP 10
Application Security Workshop
Web Application Security 101
Ad

Similar to [OPD 2019] AST Platform and the importance of multi-layered application security testing (20)

PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
PDF
Software Security Assurance for DevOps
PDF
Ast in CI/CD by Ofer Maor
PDF
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
PPTX
Transforming your Security Products at the Endpoint
PPTX
Static Analysis Security Testing for Dummies... and You
PPTX
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PPTX
OWASP Dependency-Track Introduction
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
PPTX
Secure SDLC in mobile software development.
PDF
Open-Source Security Management and Vulnerability Impact Assessment
PPTX
Netflix Cloud Architecture and Open Source
PPTX
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
PDF
Build automation best practices
PPTX
Evaluating Web App, Mobile App, and API Security - Matt Cohen
PDF
The App Sec How-To: Choosing a SAST Tool
PDF
Journey to the center of DevOps - v6
PPT
Code Quality - Security
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Software Security Assurance for DevOps
Ast in CI/CD by Ofer Maor
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Transforming your Security Products at the Endpoint
Static Analysis Security Testing for Dummies... and You
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
Web App Security Presentation by Ryan Holland - 05-31-2017
OWASP Dependency-Track Introduction
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Simplify and Scale Enterprise Spring Apps in the Cloud | March 23, 2023
Secure SDLC in mobile software development.
Open-Source Security Management and Vulnerability Impact Assessment
Netflix Cloud Architecture and Open Source
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
Build automation best practices
Evaluating Web App, Mobile App, and API Security - Matt Cohen
The App Sec How-To: Choosing a SAST Tool
Journey to the center of DevOps - v6
Code Quality - Security
Ad

More from OWASP (20)

PDF
[OPD 2019] .NET Core Security
PDF
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
PDF
[OPD 2019] Automated Defense with Serverless computing
PDF
[OPD 2019] Advanced Data Analysis in RegSOC
PDF
[OPD 2019] Attacking JWT tokens
PDF
[OPD 2019] Rumpkernels meet fuzzing
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
[Wroclaw #9] The purge - dealing with secrets in Opera Software
PDF
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
PDF
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
PDF
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
PDF
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
PPTX
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
PPTX
OWASP Poland Day 2018 - Omer Levi Hevroni - Secure the Pipeline
PDF
OWASP Poland Day 2018 - Kuai Hinojosa - Key tips to build resilient software
PPTX
OWASP Poland Day 2018 - Ralf Kempf - SAP Security - Detecting the hand still ...
PDF
OWASP Poland Day 2018 - Johan Peeters - Designing access control with OAuth a...
[OPD 2019] .NET Core Security
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Attacking JWT tokens
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Trusted types and the end of DOM XSS
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
OWASP Poland Day 2018 - Omer Levi Hevroni - Secure the Pipeline
OWASP Poland Day 2018 - Kuai Hinojosa - Key tips to build resilient software
OWASP Poland Day 2018 - Ralf Kempf - SAP Security - Detecting the hand still ...
OWASP Poland Day 2018 - Johan Peeters - Designing access control with OAuth a...

Recently uploaded (20)

PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
artificial intelligence overview of it and more
PPTX
Internet___Basics___Styled_ presentation
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Digital Literacy And Online Safety on internet
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Funds Management Learning Material for Beg
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
innovation process that make everything different.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
artificial intelligence overview of it and more
Internet___Basics___Styled_ presentation
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Digital Literacy And Online Safety on internet
Sims 4 Historia para lo sims 4 para jugar
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Introuction about WHO-FIC in ICD-10.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Funds Management Learning Material for Beg
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
innovation process that make everything different.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Job_Card_System_Styled_lorem_ipsum_.pptx

[OPD 2019] AST Platform and the importance of multi-layered application security testing

  • 1. AST Platform And the importance of multi layered application security testing
  • 2. About Me Uria Ankorion Appsec solutions expert @ Checkmarx • Strong believer in spreading security awareness • Software developer at heart
  • 3. CSC 18 Application Security Application Security and its importance
  • 5. So which tool should I use?..(hint: as many as you can)
  • 6. Application Security Technologies SAST – Static Application Security Testing IAST – Interactive Application Security Testing SCA/OSA – Software Composition Analysis DAST – Dynamic Application Security Testing RASP – Runtime Application Self Protection WAF – Web Application Firewall
  • 8. Interactive Application Security Testing (IAST) Runtime App Server Frameworks Libraries Custom Code IAST Agent Application Under Test Testing Framework IAST server IAST Dashboard 1 Monitoring of Application Under Test 2 Event-Collection during Testing 3 Security-Queries Execution 4 Pushing Vulnerabilities to the Dashboard
  • 9. Identify OS libraries metadata, vulnerabilities, licenses 3 Send list of potential OS dependencies 2 Generate report 4 Scan project sources and run dependency resolution 1 Customer's libraries (source code + binary files) Customer’s open source libraries Repository of Open Source libraries Cloud Service Software Composition Anaysis (SCA aka OSA)
  • 11. AppSec Technique Advantages Disadvantages SAST • Can be used after 1st line of code is written – max Shift Left • Makes the vulnerability fixing easy by showing the problem in the source code • Produces fast results even for large applications • Can be easily integrated into the CI process • Cannot see all flows, e.g. because of user data dependencies • Requires continuous development for new language/framework support • May require fine tuning to accommodate for custom sanitisers and services DAST • Provides visual confirmation for vulnerabilities • Doesn’t require access to source code to produce results • Requires a functional application • Can only detect reflected vulnerabilities • Takes a lot of time to generate and execute all inputs • Is difficult to integration into the CI process • Shows there is a problem, doesn’t tell where it is in the code IAST • Provides immediate feedback when suspected vulnerabilities are found • Doesn’t require access to source code to produce results • Can be integrated into the CI process • Requires a functional application • Requires existing (preferably automated and comprehensive) functional testing suite • Highly dependent on the application technology

Editor's Notes

  • #14: Phase 5: optionally - SDLC-external elements added to explain that they are not part of AST platform but how they come into play