SlideShare a Scribd company logo
Klassifikation: Öffentlich
Welcome
to the SBA Live Academy
#bleibdaheim #remotelearning
Today: Software Security – Towards a Mature Lifecycle and DevSecOps
by Thomas Konrad
This talk will be recorded as soon as the presentation starts!
Recording will end BEFORE the Q&A Session starts.
Please be sure to turn off your video in your control panel.
Classification: Customer 2SBA Research gGmbH, 2020
$ whoami
Thomas Konrad
$ id
uid=123(tom)
gid=0(SBA Research)
gid=1(Vienna, Austria)
gid=2(Software Security)
gid=3(Penetration Testing)
gid=4(Software Development)
gid=5(Security Training)
gid=6(sec4dev Conference & Bootcamp)
Classification: Public 3Photo by Quino Al on UnsplashSBA Research gGmbH, 2020
Classification: Public 4Photo by NASA on UnsplashSBA Research gGmbH, 2020
Classification: Public 5Photo by Braden Collum on UnsplashSBA Research gGmbH, 2020
Classification: Public 6
Security Costs Money, Right?
Perspectives on (software) security.
SBA Research gGmbH, 2020
Classification: Public 7
Time Is Money
SBA Research gGmbH, 2020
Classification: Public 8
Risk vs. Security Controls
SBA Research gGmbH, 2020
SQLi
XSS
CSRF
UserAccountSecurity
AccessControl
XXE
Deserial.
ComponentswithVulns
TLS
Logging
Crypto
Classification: Public 9
So You Want More Money?
No. I want to use the
limited resources
more efficiently.
SBA Research gGmbH, 2020 Photo by Fabian Blank on Unsplash
Classification: Public 10
Gartner Application Security Hype Cycle
SBA Research gGmbH, 2020
Classification: Public 11
Solution Approaches
Steps towards the future of software security.
SBA Research gGmbH, 2020
Classification: Public 12SBA Research gGmbH, 2020
We need to shift security
left in the software
development lifecycle.
Photo by Suzanne D. Williams on Unsplash
Classification: Public 13
Backwards Security Integration
SBA Research gGmbH, 2020
How can I
recover?
How do I
react?
How do I
identify
problems?
How do I
protect?
What do I
have to
protect and
why?
Ad-hocSecurity integration
Security test
before go-live
Incident / CISO
intervention
14
Shifting Left
Image source: https://www.cigital.com/blog/what-is-the-secure-software-development-lifecycle/
SBA Research gGmbH, 2020 Classification: Public
15
Threat Model Example: Account Security
Threat modeling as part of the design process
Threat Severity1 C/I/A Countermeasures
Password guessing High C/I/- (Temporary) user lockout, password
policy, MFA, transparency (device lists
and notifications, with Device Tokens)
Account lockout Medium -/-/A Selective lockout (with Device Tokens)
Misuse of known
passwords (public
lists, other apps, ...)
Medium C/I/- MFA
Someone dumps the
DB on the Internet
Medium C/I/- Proper hashes (Argon2)
Enumerating valid
user names
Low C/-/- (Generic error messages, constant timing
on all requests containing the user name)
1 The severity really depends on the classification of your data. Don’t see them as absolute and unchangeable values.
SBA Research gGmbH, 2020 Classification: Public
Classification: Public 16SBA Research gGmbH, 2020
We need to bridge the
gap between security
and agility.
Photo by Sonja Guina on Unsplash
Classification: Public 17
What is DevSecOps?
SBA Research gGmbH, 2020
DevSecOps is thinking about security
from the start.
https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
Classification: Public 18
What is DevSecOps?
SBA Research gGmbH, 2020
DevSecOps is security
automation and measurement.
https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
Classification: Public 19
What is DevSecOps?
SBA Research gGmbH, 2020
DevSecOps is sharing
between teams.
https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
Classification: Public 20
What is DevSecOps?
SBA Research gGmbH, 2020
DevSecOps is evolving from
immediate pain to strategic focus.
https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
Classification: Public 21
“Are security
teams involved in
technology design
and deployment?”
Yes
39%No
61%
Team Respondents
Yes
64%
No
36%
C-Suite Respondents
2018 State of DevOps Report,
Puppet + Splunk
Classification: Public 22
How To Make DevSecOps Work
#1: Start with simplification.
• Tool re-use is easier in a common tech stack.
• More flexibility for dev staff to work on different
projects.
• Fewer moving parts to maintain, upgrade, learn.
SBA Research gGmbH, 2020
Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
Classification: Public 23
How To Make DevSecOps Work
#2: Push existing pockets of success.
• Give a well-working team resources to build
security automation.
• Advertise to others how this buys them time to
do more fun stuff.
• Make source code available to other teams.
SBA Research gGmbH, 2020
Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
Classification: Public 24
How To Make DevSecOps Work
#3: Offer self-service security tools.
• A dedicated, cross-project, well-integrated team
for security automation.
• Pick people with good social skills.
• Get external help where necessary.
SBA Research gGmbH, 2020
Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
Classification: Public 25
How To Make DevSecOps Work
#4: Work with both empowerment and
accountability.
• Mutually enforcing DevSecOps pillars of
automation and measurement.
• Build dashboards with performance indicators.
• Play it open.
SBA Research gGmbH, 2020
Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
Classification: Public 26
How To Make DevSecOps Work
#5: Create and promote a culture of continuous
learning.
• Understanding security means understanding
technology in detail.
• Make teams work together in new ways.
• Stop the blaming culture.
• Offer security training.
SBA Research gGmbH, 2020
Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
Classification: Public 27SBA Research gGmbH, 2020
Let’s face it: You are not going to
fix your company’s culture
overnight.
Take your time but be dedicated.
Photo by Les Anderson on Unsplash
Classification: Public 28
Skill Levels of a Developer
1. Write messy, insecure code
2. Write clean code
3. Write testable code
1. High cohesion
2. loose coupling
4. Write actual tests
5. Hack the own code
6. Write secure code
SBA Research gGmbH, 2020
Classification: Public 29SBA Research gGmbH, 2020
Classification: Public 30
Which Types Of Test?
• Write a simple integration test!
• For functional and unit tests, test the right parts
SBA Research gGmbH, 2020
Classification: Public 31
What Shall I Automate First?
1. Upon every push
1. Test for known vulnerabilities in external
libraries and frameworks.
2. Scan your containers for known vulnerabilities.
2. On a regular basis
1. Scan your infrastructure.
2. Do SAST / IAST / DAST.
SBA Research gGmbH, 2020
Classification: Public 32
Dynamic Tests: Known-Good Requests
GET /profile/profile-picture?thumbnail-width=200
Input Validation
Original or scaled?
Read from filesystem Ask scaling microservice
×
×SBA Research gGmbH, 2020
Classification: Public 33
Results Are Just Symptoms
• Repeatedly fixing the same vulnerabilities?
o Consider changing the architecture and technology!
o Update common requirements!
o Update architecture recommendations!
o Add it to the threat model!
o Update secure coding guidelines!
o Implement a test in the common test suite!
o Talk about it!
• Selective fixes are just security painkillers!
SBA Research gGmbH, 2020
Classification: Public 34
What Performance Indicators Shall I Collect?
• Number of vulnerabilities/LoC over time
• Time to fix
• Number of security-related tickets/LoC
• ...
Make sure the numbers are contextually specific!
SBA Research gGmbH, 2020
Classification: Public 35SBA Research gGmbH, 2020 Photo by Austin Distel on Unsplash
There will be vulnerabilities and
there will be attacks.
The question is how we deal with them.
Classification: Public 36
Key Takeaways
Steps you can do to push yourself forward.
SBA Research gGmbH, 2020
Classification: Public 37
Key Takeaways, 1/2
• DevSecOps is a culture thing, and culture things
take time.
• It’s all about integrating security earlier.
• Security is hard. Consider that when assigning
roles.
• The difference between a good team and a bad
team is how they deal with difficult situations.
SBA Research gGmbH, 2020
Classification: Public 38
Key Takeaways, 2/2
• Steps towards DevSecOps
o #1: Start with simplification.
o #2: Push existing pockets of success.
o #3: Offer self-service security tools.
o #4: Work with both empowerment and accountability.
o #5: Create and promote a culture of continuous learning.
SBA Research gGmbH, 2020
Classification: Public 39
Thomas Konrad
SBA Research gGmbH
Floragasse 7, 1040 Wien
+43 664 889 272 17
tkonrad@sba-research.org
Twitter: @_thomaskonrad
SBA Research gGmbH, 2020
Klassifikation: Öffentlich 40
Professional Services
Penetration Testing
Architecture Reviews
Security Audit
Security Trainings
Incident Response Readiness
ISMS & ISO 27001 Consulting
Bridging Science and Industry
Applied Research
Industrial Security | IIoT Security |
Mathematics for Security Research |
Machine Learning | Blockchain | Network
Security | Sustainable Software Systems |
Usable Security
SBA Research
Knowledge Transfer
SBA Live Academy | sec4dev | Trainings |
Events | Teaching | sbaPRIME
Contact us: anfragen@sba-research.org
Klassifikation: Öffentlich 41
#stayhome #remotelearning
Coming up @ SBA Live Academy
April 14, 5 pm CET, live:
„Passwords: Policy and Storage
with NIST SP800-63b“
by Jim Manico!
Join our MeetUp Group!
https://www.meetup.com/Security-Meetup-by-SBA-
Research/

More Related Content

PDF
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
PDF
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
PDF
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
PDF
SBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
PDF
SBA Live Academy, What the heck is secure computing
PPTX
Adversary Emulation - DerpCon
PDF
ICS Cyber Security Effectiveness Measurement
PPTX
Adversary Emulation and the C2 Matrix
SBA Live Academy - CRLite – Revocation for X.509 certificates in the browser ...
SBA Live Academy - Angriffe auf Windows Domains und Delegation by Reinhard Ku...
SBA Live Academy - Physical Attacks against (I)IoT-Devices, Embedded Devices,...
SBA Live Academy: A Primer in Single Page Application Security by Thomas Konrad
SBA Live Academy, What the heck is secure computing
Adversary Emulation - DerpCon
ICS Cyber Security Effectiveness Measurement
Adversary Emulation and the C2 Matrix

What's hot (20)

PDF
Cyber Defense - How to be prepared to APT
PDF
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PDF
Establishing a-quality-vulnerability-management-program
PDF
Shift Left Security
PDF
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
PPTX
Vulnerabilities of machine learning infrastructure
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
PDF
Fighting Malware with Graph Analytics: An End-to-End Case Study
PDF
Software Engineering Process at SSL
 
PPTX
Narrative Mind Week 4 H4D Stanford 2016
PDF
Certificate Management Protocols for 1609.2 Certificates
PPTX
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
PDF
Estimating Development Security Maturity in About an Hour
PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
PDF
Severless PHP Case : Agile Dashboard via GitLab Board API
PDF
Breaking and entering how and why dhs conducts penetration tests
PDF
Security precognition chaos engineering in incident response
Cyber Defense - How to be prepared to APT
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Establishing a-quality-vulnerability-management-program
Shift Left Security
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Adversary Emulation and Red Team Exercises - EDUCAUSE
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
Vulnerabilities of machine learning infrastructure
DATA LOSS PREVENTION OVERVIEW
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Fighting Malware with Graph Analytics: An End-to-End Case Study
Software Engineering Process at SSL
 
Narrative Mind Week 4 H4D Stanford 2016
Certificate Management Protocols for 1609.2 Certificates
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Estimating Development Security Maturity in About an Hour
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
Severless PHP Case : Agile Dashboard via GitLab Board API
Breaking and entering how and why dhs conducts penetration tests
Security precognition chaos engineering in incident response
Ad

Similar to SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOps by Thomas Konrad (20)

PDF
Maturing DevSecOps: From Easy to High Impact
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
The Future of DevSecOps
PDF
DevSecOps in 2031: How robots and humans will secure apps together Log
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
PPTX
IronHacks Live: Info session #3 - COVID-19 Data Science Challenge
PPTX
Philly ETE 2016: Securing Software by Construction
PPTX
Skynet Week 9 H4D Stanford 2016
PPTX
OWASP SB -Threat modeling 101
DOCX
TASK 1In regards to part 1 of this assessment, please read t.docx
PPTX
Application security meetup 27012021
PDF
DevSecOps for Developers: How To Start
PPTX
Threat Modeling All Day!
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
Believe it or not - keynote CAS 2015
PDF
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
PPTX
PMI CH AMM2023 - Bye Bye Project Manager - SwissQ.pptx
PDF
27.2.15 lab investigating a malware exploit
PPTX
How can you deliver a secure product
PPTX
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Maturing DevSecOps: From Easy to High Impact
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
The Future of DevSecOps
DevSecOps in 2031: How robots and humans will secure apps together Log
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
IronHacks Live: Info session #3 - COVID-19 Data Science Challenge
Philly ETE 2016: Securing Software by Construction
Skynet Week 9 H4D Stanford 2016
OWASP SB -Threat modeling 101
TASK 1In regards to part 1 of this assessment, please read t.docx
Application security meetup 27012021
DevSecOps for Developers: How To Start
Threat Modeling All Day!
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Believe it or not - keynote CAS 2015
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
PMI CH AMM2023 - Bye Bye Project Manager - SwissQ.pptx
27.2.15 lab investigating a malware exploit
How can you deliver a secure product
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Ad

More from SBA Research (20)

PDF
CyberResilienceAct_sec4devDialogues2025pdf
PDF
SBATop10 Vulnerabilities_sec4devDialogues2025
PDF
Passkeys & 2FA/MFA_sec4dev_Dialogues2025
PDF
Gefahren von Prompt-Injection Angriffen_sec4devDialogues.pdf
PDF
SBA Security Meetup - Deploying and managing azure sentinel as code by Bojan ...
PDF
NDSS 2021 RandRunner: Distributed Randomness from Trapdoor VDFs with Strong U...
PDF
SBA Security Meetup – Security Requirements Management 101 by Daniel Schwarz ...
PDF
SBA Security Meetup: Building a Secure Architecture – A Deep-Dive into Securi...
PDF
SBA Security Meetup: I want to break free - The attacker inside a Container
PDF
"Rund um die ISO27001 Zertifizierung – Nähkästchentalk" by Thomas Kopeinig
PPTX
Secure development on Kubernetes by Andreas Falk
PDF
SBA Live Academy - "BIG BANG!" Highlights & key takeaways of 24 security talks
PDF
SBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
PDF
Tools & techniques, building a dev secops culture at mozilla sba live a...
PDF
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philip...
PDF
SBA Live Academy - Secure Containers for Developer by Mathias Tausig
PDF
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
PDF
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
PDF
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
PDF
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...
CyberResilienceAct_sec4devDialogues2025pdf
SBATop10 Vulnerabilities_sec4devDialogues2025
Passkeys & 2FA/MFA_sec4dev_Dialogues2025
Gefahren von Prompt-Injection Angriffen_sec4devDialogues.pdf
SBA Security Meetup - Deploying and managing azure sentinel as code by Bojan ...
NDSS 2021 RandRunner: Distributed Randomness from Trapdoor VDFs with Strong U...
SBA Security Meetup – Security Requirements Management 101 by Daniel Schwarz ...
SBA Security Meetup: Building a Secure Architecture – A Deep-Dive into Securi...
SBA Security Meetup: I want to break free - The attacker inside a Container
"Rund um die ISO27001 Zertifizierung – Nähkästchentalk" by Thomas Kopeinig
Secure development on Kubernetes by Andreas Falk
SBA Live Academy - "BIG BANG!" Highlights & key takeaways of 24 security talks
SBA Live Academy, Rechtliche Risiken mit externen Mitarbeitern
Tools & techniques, building a dev secops culture at mozilla sba live a...
HydRand: Efficient Continuous Distributed Randomness. IEEE S&P 2020 by Philip...
SBA Live Academy - Secure Containers for Developer by Mathias Tausig
SBA Live Academy - After the overflow: self-defense techniques (Linux Kernel)...
SBA Live Academy - Passwords: Policy and Storage with NIST SP800-63b by Jim M...
SBA Live Academy - Threat Modeling 101 – eine kurze aber praxisnahe Einführun...
SBA Live Academy - Angriffe gegen das Stromnetz – Wenn der Strom nicht mehr a...

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?

SBA Live Academy: Software Security – Towards a Mature Lifecycle and DevSecOps by Thomas Konrad

  • 1. Klassifikation: Öffentlich Welcome to the SBA Live Academy #bleibdaheim #remotelearning Today: Software Security – Towards a Mature Lifecycle and DevSecOps by Thomas Konrad This talk will be recorded as soon as the presentation starts! Recording will end BEFORE the Q&A Session starts. Please be sure to turn off your video in your control panel.
  • 2. Classification: Customer 2SBA Research gGmbH, 2020 $ whoami Thomas Konrad $ id uid=123(tom) gid=0(SBA Research) gid=1(Vienna, Austria) gid=2(Software Security) gid=3(Penetration Testing) gid=4(Software Development) gid=5(Security Training) gid=6(sec4dev Conference & Bootcamp)
  • 3. Classification: Public 3Photo by Quino Al on UnsplashSBA Research gGmbH, 2020
  • 4. Classification: Public 4Photo by NASA on UnsplashSBA Research gGmbH, 2020
  • 5. Classification: Public 5Photo by Braden Collum on UnsplashSBA Research gGmbH, 2020
  • 6. Classification: Public 6 Security Costs Money, Right? Perspectives on (software) security. SBA Research gGmbH, 2020
  • 7. Classification: Public 7 Time Is Money SBA Research gGmbH, 2020
  • 8. Classification: Public 8 Risk vs. Security Controls SBA Research gGmbH, 2020 SQLi XSS CSRF UserAccountSecurity AccessControl XXE Deserial. ComponentswithVulns TLS Logging Crypto
  • 9. Classification: Public 9 So You Want More Money? No. I want to use the limited resources more efficiently. SBA Research gGmbH, 2020 Photo by Fabian Blank on Unsplash
  • 10. Classification: Public 10 Gartner Application Security Hype Cycle SBA Research gGmbH, 2020
  • 11. Classification: Public 11 Solution Approaches Steps towards the future of software security. SBA Research gGmbH, 2020
  • 12. Classification: Public 12SBA Research gGmbH, 2020 We need to shift security left in the software development lifecycle. Photo by Suzanne D. Williams on Unsplash
  • 13. Classification: Public 13 Backwards Security Integration SBA Research gGmbH, 2020 How can I recover? How do I react? How do I identify problems? How do I protect? What do I have to protect and why? Ad-hocSecurity integration Security test before go-live Incident / CISO intervention
  • 14. 14 Shifting Left Image source: https://www.cigital.com/blog/what-is-the-secure-software-development-lifecycle/ SBA Research gGmbH, 2020 Classification: Public
  • 15. 15 Threat Model Example: Account Security Threat modeling as part of the design process Threat Severity1 C/I/A Countermeasures Password guessing High C/I/- (Temporary) user lockout, password policy, MFA, transparency (device lists and notifications, with Device Tokens) Account lockout Medium -/-/A Selective lockout (with Device Tokens) Misuse of known passwords (public lists, other apps, ...) Medium C/I/- MFA Someone dumps the DB on the Internet Medium C/I/- Proper hashes (Argon2) Enumerating valid user names Low C/-/- (Generic error messages, constant timing on all requests containing the user name) 1 The severity really depends on the classification of your data. Don’t see them as absolute and unchangeable values. SBA Research gGmbH, 2020 Classification: Public
  • 16. Classification: Public 16SBA Research gGmbH, 2020 We need to bridge the gap between security and agility. Photo by Sonja Guina on Unsplash
  • 17. Classification: Public 17 What is DevSecOps? SBA Research gGmbH, 2020 DevSecOps is thinking about security from the start. https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
  • 18. Classification: Public 18 What is DevSecOps? SBA Research gGmbH, 2020 DevSecOps is security automation and measurement. https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
  • 19. Classification: Public 19 What is DevSecOps? SBA Research gGmbH, 2020 DevSecOps is sharing between teams. https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
  • 20. Classification: Public 20 What is DevSecOps? SBA Research gGmbH, 2020 DevSecOps is evolving from immediate pain to strategic focus. https://www.redhat.com/en/topics/devops/what-is-devsecops, 2018 State of DevOps Report
  • 21. Classification: Public 21 “Are security teams involved in technology design and deployment?” Yes 39%No 61% Team Respondents Yes 64% No 36% C-Suite Respondents 2018 State of DevOps Report, Puppet + Splunk
  • 22. Classification: Public 22 How To Make DevSecOps Work #1: Start with simplification. • Tool re-use is easier in a common tech stack. • More flexibility for dev staff to work on different projects. • Fewer moving parts to maintain, upgrade, learn. SBA Research gGmbH, 2020 Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
  • 23. Classification: Public 23 How To Make DevSecOps Work #2: Push existing pockets of success. • Give a well-working team resources to build security automation. • Advertise to others how this buys them time to do more fun stuff. • Make source code available to other teams. SBA Research gGmbH, 2020 Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
  • 24. Classification: Public 24 How To Make DevSecOps Work #3: Offer self-service security tools. • A dedicated, cross-project, well-integrated team for security automation. • Pick people with good social skills. • Get external help where necessary. SBA Research gGmbH, 2020 Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
  • 25. Classification: Public 25 How To Make DevSecOps Work #4: Work with both empowerment and accountability. • Mutually enforcing DevSecOps pillars of automation and measurement. • Build dashboards with performance indicators. • Play it open. SBA Research gGmbH, 2020 Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
  • 26. Classification: Public 26 How To Make DevSecOps Work #5: Create and promote a culture of continuous learning. • Understanding security means understanding technology in detail. • Make teams work together in new ways. • Stop the blaming culture. • Offer security training. SBA Research gGmbH, 2020 Partially taken from the 2018 State of DevOps Report by Puppet + Splunk
  • 27. Classification: Public 27SBA Research gGmbH, 2020 Let’s face it: You are not going to fix your company’s culture overnight. Take your time but be dedicated. Photo by Les Anderson on Unsplash
  • 28. Classification: Public 28 Skill Levels of a Developer 1. Write messy, insecure code 2. Write clean code 3. Write testable code 1. High cohesion 2. loose coupling 4. Write actual tests 5. Hack the own code 6. Write secure code SBA Research gGmbH, 2020
  • 29. Classification: Public 29SBA Research gGmbH, 2020
  • 30. Classification: Public 30 Which Types Of Test? • Write a simple integration test! • For functional and unit tests, test the right parts SBA Research gGmbH, 2020
  • 31. Classification: Public 31 What Shall I Automate First? 1. Upon every push 1. Test for known vulnerabilities in external libraries and frameworks. 2. Scan your containers for known vulnerabilities. 2. On a regular basis 1. Scan your infrastructure. 2. Do SAST / IAST / DAST. SBA Research gGmbH, 2020
  • 32. Classification: Public 32 Dynamic Tests: Known-Good Requests GET /profile/profile-picture?thumbnail-width=200 Input Validation Original or scaled? Read from filesystem Ask scaling microservice × ×SBA Research gGmbH, 2020
  • 33. Classification: Public 33 Results Are Just Symptoms • Repeatedly fixing the same vulnerabilities? o Consider changing the architecture and technology! o Update common requirements! o Update architecture recommendations! o Add it to the threat model! o Update secure coding guidelines! o Implement a test in the common test suite! o Talk about it! • Selective fixes are just security painkillers! SBA Research gGmbH, 2020
  • 34. Classification: Public 34 What Performance Indicators Shall I Collect? • Number of vulnerabilities/LoC over time • Time to fix • Number of security-related tickets/LoC • ... Make sure the numbers are contextually specific! SBA Research gGmbH, 2020
  • 35. Classification: Public 35SBA Research gGmbH, 2020 Photo by Austin Distel on Unsplash There will be vulnerabilities and there will be attacks. The question is how we deal with them.
  • 36. Classification: Public 36 Key Takeaways Steps you can do to push yourself forward. SBA Research gGmbH, 2020
  • 37. Classification: Public 37 Key Takeaways, 1/2 • DevSecOps is a culture thing, and culture things take time. • It’s all about integrating security earlier. • Security is hard. Consider that when assigning roles. • The difference between a good team and a bad team is how they deal with difficult situations. SBA Research gGmbH, 2020
  • 38. Classification: Public 38 Key Takeaways, 2/2 • Steps towards DevSecOps o #1: Start with simplification. o #2: Push existing pockets of success. o #3: Offer self-service security tools. o #4: Work with both empowerment and accountability. o #5: Create and promote a culture of continuous learning. SBA Research gGmbH, 2020
  • 39. Classification: Public 39 Thomas Konrad SBA Research gGmbH Floragasse 7, 1040 Wien +43 664 889 272 17 tkonrad@sba-research.org Twitter: @_thomaskonrad SBA Research gGmbH, 2020
  • 40. Klassifikation: Öffentlich 40 Professional Services Penetration Testing Architecture Reviews Security Audit Security Trainings Incident Response Readiness ISMS & ISO 27001 Consulting Bridging Science and Industry Applied Research Industrial Security | IIoT Security | Mathematics for Security Research | Machine Learning | Blockchain | Network Security | Sustainable Software Systems | Usable Security SBA Research Knowledge Transfer SBA Live Academy | sec4dev | Trainings | Events | Teaching | sbaPRIME Contact us: anfragen@sba-research.org
  • 41. Klassifikation: Öffentlich 41 #stayhome #remotelearning Coming up @ SBA Live Academy April 14, 5 pm CET, live: „Passwords: Policy and Storage with NIST SP800-63b“ by Jim Manico! Join our MeetUp Group! https://www.meetup.com/Security-Meetup-by-SBA- Research/