1
Skype: florykian.karen EPAM Kharkiv
Security
Automation
Easy or cheese
by Karen Florykian
Lead Performance Analyst
2
Application Security Testing
Security assessment for routers,
firewall, load balancers, switches,
find network misconfiguration
Infrastructure Scanning
OS vulnerabilities, known
vulnerabilities in images, evaluate
the image against policies to check
for security compliance.
Container Scanning
Dynamic application security testing
Find security vulnerabilities in a running
application, typically web apps.
DAST
Static Application Security Testing
Catch security issues on early stages
of code development, allows
developers to find bugs in code
SAST
Many types of security vulnerabilities are difficult to
find automatically, such as authentication problems,
access control issues, insecure use of cryptography,
etc.
Functional Security Automation
3
Security Automation
03
01
04
02
Speed
Integrity
Availability
Visibility
4
Real Life
68 %
False positive analysis
25 %
29 % 39 %
7 %
5
Real Life
85 %
of findings are
not real issues
25 %
29 % 39 %
7 %
6
Vision
7
Proof Of Concept
• Integrated in existing CI pipeline
or configured to be ran on self-
service basis
• Traffic created using existing
tests
• False Positives analysis can be
partially automated using DefectDojo
or ReportPortal capabilities
8
Project Pipeline
9
Under The SAST Hood
10
Grouping
Jira service
ReportPortal
Jira Service
Junit XML
11
Spidergetti Or Rainboweb
Jira service
ReportPortal
Jira Service
Junit XML
12
Canonical Data Model
Jira service
ReportPortal
Jira Service
Junit XML
CDM
13
Auto-Analysis
• Validate capabilities
• Identify parameters to reduce duplicates
• Create service with equals strategy
• Contact to ReportPortal team to create
custom analyzer service with equals
strategy
14
Issue #1
15
Issue #2
16
We All Are Lazy
VS
OPEN FOR WEEKS
BECAUSE IT IS
NOT ACTIONABLE
FIXED WITHIN
THE WEEK IT
APPEARED IN BACKLOG
17
Carrier
carrier-io/sast: Tools for SAST
Demo
18
Useful Links
• SAST: https://github.com/carrier-io/sast
• Docker Hub: https://hub.docker.com/r/getcarrier/sast
• DAST: https://github.com/carrier-io/dast
• Docker Hub: https://hub.docker.com/r/getcarrier/dast
• DASTY : https://github.com/carrier-io/dusty Library to execute various
security tools and convert output to common unified format
• Carrier: https://hub.docker.com/u/getcarrier
• ReportPortal Auto-Analysis equals service:
https://github.com/reportportal/service-analyzer-equals
19
Thank You!Florykian Karen
Lead Performance Analyst

More Related Content

PPTX
Cybersecurity overview - Open source compliance seminar
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PPTX
OTG - Practical Hands on VAPT
PDF
Is av dead or just missing in action - avar2016
PPTX
Primer: The top ten automotive cybersecurity vulnerabilities of 2015
PDF
Reducing Risk of Credential Compromise at Netflix
PDF
we45 - Web Application Security Testing Case Study
PDF
Web Application Security Testing Tools
Cybersecurity overview - Open source compliance seminar
SAST vs. DAST: What’s the Best Method For Application Security Testing?
OTG - Practical Hands on VAPT
Is av dead or just missing in action - avar2016
Primer: The top ten automotive cybersecurity vulnerabilities of 2015
Reducing Risk of Credential Compromise at Netflix
we45 - Web Application Security Testing Case Study
Web Application Security Testing Tools

What's hot (19)

PPTX
Application Security at DevOps Speed and Portfolio Scale
PPTX
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
PPS
Security testing
PDF
Sast 2021
PPTX
Security Testing
PPTX
Security testing fundamentals
PDF
Introduction to Application Security Testing
PDF
Testing Web Application Security
PPTX
Inside forti os-v524-r5
PPT
Zap attack proxy
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
PPTX
BUSTED! How to Find Security Bugs Fast!
PDF
Innovating Faster with Continuous Application Security
PDF
Security-testing presentation
PPTX
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
PPT
Get Ready for Web Application Security Testing
PDF
Echelon_Sibcon-2016
Application Security at DevOps Speed and Portfolio Scale
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Security testing
Sast 2021
Security Testing
Security testing fundamentals
Introduction to Application Security Testing
Testing Web Application Security
Inside forti os-v524-r5
Zap attack proxy
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
BUSTED! How to Find Security Bugs Fast!
Innovating Faster with Continuous Application Security
Security-testing presentation
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Get Ready for Web Application Security Testing
Echelon_Sibcon-2016
Ad

Similar to Security Automation: Easy or Cheese (20)

PDF
What Every Developer And Tester Should Know About Software Security
PPTX
Is Antivirus (AV) Dead or Just Missing in Action
PDF
securing-your-software-delivery-pipelines-with-a-slight-shift-to-the-left.pdf
PPTX
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...
PPTX
Web applications security conference slides
PDF
CODE INSPECTION VIMRO 2015 MHF
PDF
NSA and PT
PPT
Code Quality - Security
PPTX
Security by the numbers
PPT
IBM AppScan - the total software security solution
PDF
Is Your Business Safe from Cyber Threats? VAPT Can Help!
PDF
Cyber security series Application Security
PPTX
Security Testing.pptx
PDF
Using Analyzers to Resolve Security Problems
PPTX
Secure SDLC in mobile software development.
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
PPTX
Evaluating Web App, Mobile App, and API Security - Matt Cohen
PDF
Quantstamp Report - LINKSWAP
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
DOCX
Demand for Penetration Testing Services.docx
What Every Developer And Tester Should Know About Software Security
Is Antivirus (AV) Dead or Just Missing in Action
securing-your-software-delivery-pipelines-with-a-slight-shift-to-the-left.pdf
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...
Web applications security conference slides
CODE INSPECTION VIMRO 2015 MHF
NSA and PT
Code Quality - Security
Security by the numbers
IBM AppScan - the total software security solution
Is Your Business Safe from Cyber Threats? VAPT Can Help!
Cyber security series Application Security
Security Testing.pptx
Using Analyzers to Resolve Security Problems
Secure SDLC in mobile software development.
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Quantstamp Report - LINKSWAP
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Demand for Penetration Testing Services.docx
Ad

Recently uploaded (20)

PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
Design of Material Handling Equipment Lecture Note
PPTX
wireless networks, mobile computing.pptx
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
Software Engineering and software moduleing
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PPTX
Feature types and data preprocessing steps
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
ai_satellite_crop_management_20250815030350.pptx
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
August -2025_Top10 Read_Articles_ijait.pdf
Information Storage and Retrieval Techniques Unit III
Applications of Equal_Area_Criterion.pdf
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Design of Material Handling Equipment Lecture Note
wireless networks, mobile computing.pptx
distributed database system" (DDBS) is often used to refer to both the distri...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Software Engineering and software moduleing
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Module 8- Technological and Communication Skills.pptx
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
Feature types and data preprocessing steps
MLpara ingenieira CIVIL, meca Y AMBIENTAL
ai_satellite_crop_management_20250815030350.pptx
Exploratory_Data_Analysis_Fundamentals.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx

Security Automation: Easy or Cheese