SlideShare a Scribd company logo
SECURITY FOR DEVELOPERS
@shawkyz1
@shawkyz
ABOUT ME
• Built multiple CI/CD Pipelines for businesses with different needs.
• Lived 4 Years in Germany and now I’m back to ‫الوطن‬ ‫أرض‬
• A Software Engineer at day, a Hacker by night.
• Love to automate everything.
• In love with Security and an OSCP Holder.
• Technical Consultant @S3Geeks
• Security and Systems Engineer @FuturaSolutionsGmbH
SDLC (SOFTWARE DEVELOPMENT LIFECYCLE)
• A Software Development Life Cycle (SDLC) is a framework that defines the process
used by organizations to build an application from its inception to its
decommission. Over the years, multiple standard SDLC models have been proposed
(Waterfall, Iterative, Agile, etc.) and used in various ways to fit individual
circumstances.
• Planning and requirements.
• Architecture and design.
• Test planning.
• Coding.
• Testing and results.
• Release and maintenance.
SDLC PHASES
SECURE YOUR SDLC ACCORDING TO
MICROSOFT
• Provide Training.
• Define Security Requirements.
• Perform Thread Modeling.
• Define and Use Cryptography Standards.
• Follow Best Practices.
• Perform Static Analysis.
• Perform Dynamic Analysis.
• Regularly Pentest.
• Establish Incident Response Mechanism.
Source: https://www.microsoft.com/en-us/securityengineering/sdl/practices
•What happens when you write a url in a browser
and press enter?
HOW HTTP WORKS
• GET requests a specific resource in its entirety
• HEAD requests a specific resource without the body content
• POST adds content, messages, or data to a new page under an existing web resource
• PUT directly modifies an existing web resource or creates a new URI if need be
• DELETE gets rid of a specified resource
• TRACE shows users any changes or additions made to a web resource
• OPTIONS shows users which HTTP methods are available for a specific URL
• CONNECT converts the request connection to a transparent TCP/IP tunnel
• PATCH partially modifies a web resource
HTTP REQUESTS
HTTP HEADERS
• Origin
• Accept
• Accept-Encoding
• Cookie
• Cache-Control
• Dnt
but many more exist.
HTTP RESPONSES
• 200 OK
• 404 Not Found
• 403 Forbidden
• 301 Moved Permanently
• 500 Internal Server Error
• 304 Not Modified
• 401 Unauthorized
OWASP TOP 10
RESOURCE FOR DEVS?
• Troy Hunt‘s OWASP Top 10 for .NET developers
• https://files.troyhunt.com/OWASP%20Top%2010%20for%20.NET%20developers.pdf
• OWASP TOP 10 2017
• https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf
LET‘S DO SOME HACKING
•DEMO WEBGOAT.NET
VULNERABILITY RATING
•What is CVSS?
• Define your app Scope.
• Regular and Internal Penetration tests.
• Bug Bounty? Let the crowd hack you.
SECURITY TESTS
HOW TO YOU APPLY BEST PRACTICES
• Always check OWASP‘s Best practices for a certain vulnerability.
• Look for OWASP‘s Library/Framework Recommendations.
HOW DO I KNOW ABOUT NEW 0DAYS?
• Check if your local CERT if they offer a newsletter.
• Subscribe to MITRE newsletter https://cve.mitre.org/news/newsletter.html
• Regrularly Update Libraries/Frameworks you‘re using.
SECURE YOUR CI/CD
• Code Analysis. Analyze code for application specific vulnerabilities.
• Container Hardening. Remove unneeded libraries and packages; restrict functions.
• Image Scanning. Scan images for vulnerabilities at build; regularly in registries.
• Image Signing, e.g. Content Trust. Ensure trust with signing and author / publisher verification.
• User Access Controls, e.g. Registries. Restrict and monitor access to trusted registries and deployment
tools.
• Host and Kernel Security. Use SECCOMP, AppArmor, or SELinux or equivalent host security settings.
• Access Controls. Enable restricted access to system and Docker daemon.
• Auditing, e.g. Docker Bench. Perform security audit using Docker CIS benchmark.
SECURE YOUR CI/CD
• Network Inspection & Visualization. Inspect all container to container connections and build
visualization for application stack behavior.
• Threat Detection. Monitor applications for DDoS, DNS attacks and other network based application
attacks.
• Host & Container Privilege Escalation Detection. Detect privilege escalations on hosts and containers to
predict break outs and attacks.
• Packet Capture & Event Logging. Capture packets and event logs to enable forensics.
FOLLOW ME?
@shawkyz1
@shawkyz
@shawkyz1
https://shawkyz.info abdelrhmanshawky4@gmail.com

More Related Content

PPTX
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
PDF
Monitor Micro-service with MicroProfile metrics
PDF
How Class Data Sharing Can Speed up Your Jakarta EE Application Startup
PDF
JBCNConf 2017 - Building microservices with Vert.x
PDF
GeekOut 2017 - Microservices in action at the Dutch National Police
PDF
Gradual migration to MicroProfile
PDF
Secure JAX-RS
PDF
Version Control in TFS 2013: GIT - 2013 Application Lifecycle Management Event
JakartaOne Livestream CN4J: Eclipse MicroProfile - Your Cloud-Native Companion
Monitor Micro-service with MicroProfile metrics
How Class Data Sharing Can Speed up Your Jakarta EE Application Startup
JBCNConf 2017 - Building microservices with Vert.x
GeekOut 2017 - Microservices in action at the Dutch National Police
Gradual migration to MicroProfile
Secure JAX-RS
Version Control in TFS 2013: GIT - 2013 Application Lifecycle Management Event

What's hot (19)

PDF
Windows azure sql_database_security_isug012013
PDF
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
PPTX
Mastering Secrets Management in Rundeck
PDF
SQL Server 2017 CLR
PPTX
Production Challenges for Container Networking
PPT
Software Carpentry - Version control slides
PDF
EVE Microservices Platform
PPTX
MicroService Architecture
PDF
Digital Forensics and Incident Response in The Cloud
PPTX
Cloud native policy enforcement with Open Policy Agent
PDF
Javantura v4 - True RESTful Java Web Services with JSON API and Katharsis - M...
PDF
[WSO2Con EU 2017] Writing Microservices Using MSF4J
PDF
SQL Server 2017 CLR
PDF
Microservices Architecture
PPTX
Istio Mesh – Managing Container Deployments at Scale
PDF
OpenShift for Triangle JavaUG
PDF
Single Source of Truth in a Distributed World by Sven Erik Knop
PDF
Digital Forensics and Incident Response in The Cloud
PDF
Crikeycon 2019 Velociraptor Workshop
Windows azure sql_database_security_isug012013
Application Deployment and Management at Scale with 1&1 by Matt Baldwin
Mastering Secrets Management in Rundeck
SQL Server 2017 CLR
Production Challenges for Container Networking
Software Carpentry - Version control slides
EVE Microservices Platform
MicroService Architecture
Digital Forensics and Incident Response in The Cloud
Cloud native policy enforcement with Open Policy Agent
Javantura v4 - True RESTful Java Web Services with JSON API and Katharsis - M...
[WSO2Con EU 2017] Writing Microservices Using MSF4J
SQL Server 2017 CLR
Microservices Architecture
Istio Mesh – Managing Container Deployments at Scale
OpenShift for Triangle JavaUG
Single Source of Truth in a Distributed World by Sven Erik Knop
Digital Forensics and Incident Response in The Cloud
Crikeycon 2019 Velociraptor Workshop
Ad

Similar to Security for devs (20)

PPTX
DevOps intro
PPTX
12 Factor App Methodology
PDF
Building scalbale cloud native apps with .NET 8
PDF
Containers and microservices for realists
PDF
Containers and Microservices for Realists
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Containers, microservices and serverless for realists
PDF
Agile Secure Cloud Application Development Management
PDF
Auditing Drupal Sites for Performance, Content and Optimal Configuration - SA...
PDF
StarlingX - A Platform for the Distributed Edge | Ildiko Vancsa
PPTX
Power of Azure Devops
PDF
15-factor-apps.pdf
PPTX
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
PDF
BYOP: Custom Processor Development with Apache NiFi
PDF
Terrascan - Cloud Native Security Tool
PPTX
Staying Close to Experts with Executable Specifications
PDF
Getting to Walk with DevOps
PPTX
OpenStack Enabling DevOps
PDF
Improving WordPress Development and Deployments with Docker
PDF
Continuous Delivery in the Cloud with Bitbucket Pipelines
DevOps intro
12 Factor App Methodology
Building scalbale cloud native apps with .NET 8
Containers and microservices for realists
Containers and Microservices for Realists
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Containers, microservices and serverless for realists
Agile Secure Cloud Application Development Management
Auditing Drupal Sites for Performance, Content and Optimal Configuration - SA...
StarlingX - A Platform for the Distributed Edge | Ildiko Vancsa
Power of Azure Devops
15-factor-apps.pdf
DevSecCon Tel Aviv 2018 - End2End containers SSDLC by Vitaly Davidoff
BYOP: Custom Processor Development with Apache NiFi
Terrascan - Cloud Native Security Tool
Staying Close to Experts with Executable Specifications
Getting to Walk with DevOps
OpenStack Enabling DevOps
Improving WordPress Development and Deployments with Docker
Continuous Delivery in the Cloud with Bitbucket Pipelines
Ad

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
ai tools demonstartion for schools and inter college
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
top salesforce developer skills in 2025.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Digital Strategies for Manufacturing Companies
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
System and Network Administration Chapter 2
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Understanding Forklifts - TECH EHS Solution
Odoo Companies in India – Driving Business Transformation.pdf
ai tools demonstartion for schools and inter college
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
top salesforce developer skills in 2025.pdf
Odoo POS Development Services by CandidRoot Solutions
Design an Analysis of Algorithms I-SECS-1021-03
Which alternative to Crystal Reports is best for small or large businesses.pdf
Transform Your Business with a Software ERP System
How Creative Agencies Leverage Project Management Software.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Digital Strategies for Manufacturing Companies
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Operating system designcfffgfgggggggvggggggggg
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf

Security for devs

  • 2. ABOUT ME • Built multiple CI/CD Pipelines for businesses with different needs. • Lived 4 Years in Germany and now I’m back to ‫الوطن‬ ‫أرض‬ • A Software Engineer at day, a Hacker by night. • Love to automate everything. • In love with Security and an OSCP Holder. • Technical Consultant @S3Geeks • Security and Systems Engineer @FuturaSolutionsGmbH
  • 3. SDLC (SOFTWARE DEVELOPMENT LIFECYCLE) • A Software Development Life Cycle (SDLC) is a framework that defines the process used by organizations to build an application from its inception to its decommission. Over the years, multiple standard SDLC models have been proposed (Waterfall, Iterative, Agile, etc.) and used in various ways to fit individual circumstances.
  • 4. • Planning and requirements. • Architecture and design. • Test planning. • Coding. • Testing and results. • Release and maintenance. SDLC PHASES
  • 5. SECURE YOUR SDLC ACCORDING TO MICROSOFT • Provide Training. • Define Security Requirements. • Perform Thread Modeling. • Define and Use Cryptography Standards. • Follow Best Practices. • Perform Static Analysis. • Perform Dynamic Analysis. • Regularly Pentest. • Establish Incident Response Mechanism. Source: https://www.microsoft.com/en-us/securityengineering/sdl/practices
  • 6. •What happens when you write a url in a browser and press enter?
  • 8. • GET requests a specific resource in its entirety • HEAD requests a specific resource without the body content • POST adds content, messages, or data to a new page under an existing web resource • PUT directly modifies an existing web resource or creates a new URI if need be • DELETE gets rid of a specified resource • TRACE shows users any changes or additions made to a web resource • OPTIONS shows users which HTTP methods are available for a specific URL • CONNECT converts the request connection to a transparent TCP/IP tunnel • PATCH partially modifies a web resource HTTP REQUESTS
  • 9. HTTP HEADERS • Origin • Accept • Accept-Encoding • Cookie • Cache-Control • Dnt but many more exist.
  • 10. HTTP RESPONSES • 200 OK • 404 Not Found • 403 Forbidden • 301 Moved Permanently • 500 Internal Server Error • 304 Not Modified • 401 Unauthorized
  • 12. RESOURCE FOR DEVS? • Troy Hunt‘s OWASP Top 10 for .NET developers • https://files.troyhunt.com/OWASP%20Top%2010%20for%20.NET%20developers.pdf • OWASP TOP 10 2017 • https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf
  • 13. LET‘S DO SOME HACKING •DEMO WEBGOAT.NET
  • 15. • Define your app Scope. • Regular and Internal Penetration tests. • Bug Bounty? Let the crowd hack you. SECURITY TESTS
  • 16. HOW TO YOU APPLY BEST PRACTICES • Always check OWASP‘s Best practices for a certain vulnerability. • Look for OWASP‘s Library/Framework Recommendations.
  • 17. HOW DO I KNOW ABOUT NEW 0DAYS? • Check if your local CERT if they offer a newsletter. • Subscribe to MITRE newsletter https://cve.mitre.org/news/newsletter.html • Regrularly Update Libraries/Frameworks you‘re using.
  • 18. SECURE YOUR CI/CD • Code Analysis. Analyze code for application specific vulnerabilities. • Container Hardening. Remove unneeded libraries and packages; restrict functions. • Image Scanning. Scan images for vulnerabilities at build; regularly in registries. • Image Signing, e.g. Content Trust. Ensure trust with signing and author / publisher verification. • User Access Controls, e.g. Registries. Restrict and monitor access to trusted registries and deployment tools. • Host and Kernel Security. Use SECCOMP, AppArmor, or SELinux or equivalent host security settings. • Access Controls. Enable restricted access to system and Docker daemon. • Auditing, e.g. Docker Bench. Perform security audit using Docker CIS benchmark.
  • 19. SECURE YOUR CI/CD • Network Inspection & Visualization. Inspect all container to container connections and build visualization for application stack behavior. • Threat Detection. Monitor applications for DDoS, DNS attacks and other network based application attacks. • Host & Container Privilege Escalation Detection. Detect privilege escalations on hosts and containers to predict break outs and attacks. • Packet Capture & Event Logging. Capture packets and event logs to enable forensics.