SlideShare a Scribd company logo
The left is not wrong,
just not right;
It’s time to shift RIGHT!
Phillip Maddux
Principle AppSec Researcher & Advisor
12 yrs AppSec in Financials
IT & IT Audit prior
@foospidy
github.com/foospidy
linkedin.pxmx.io
pxmx.io
Just in case, this is an AppSec talk, not a political talk...
There, that’s better.
Containers
The Call To Shift Left
The DevSecOps paradigm that we are
all preaching is "Shift Security
Left" e.g. design and develop your
application with security in mind as
early as possible and integrate
security into CI/CD pipeline.
- Anonymous (Anonymous as in an AppSec person in
an AppSec Slack channel, not _ )
What is this shifting left?
An approach to software testing and system
testing in which testing is performed earlier in
the life cycle (i.e. moved left on the project
timeline). It is the first half of the maxim "Test
early and often." - Wikipedia
In the parlance of DevOps and security, a shift
left simply means that security is built into the
process and designed into the application at an
earlier stage of the development cycle. -
SecurityRoundtable
Shiftin’ Left
Requirements, Design, Development, Build, Testing & Deployment
TestingintheSDLC
Shiftin’ Lefter
Developer Training
Security Champions
Relationships w/Devs
Achievement coins
Gamification
Security engineering
Requirements, Design, Development, Build
TestingintheSDLC
Shiftin’ Lefter
Developer Training
Security Champions
Relationships w/Devs
Achievement coins
Gamification
Security engineering
That is all good
Photo by Jonathan Daniels on Unsplash
So what is the issue?
We’ve been doing this for
years!
SDLC Evolution to the Left
Requirements, Design, Development, Build, Testing & Deployment
TestingintheSDLC
Pen Testing
Arch Review
Code Scanning
Manual Code
Review
Dependency
Checks
Arch ReviewsControl
Standards
Security
Unit
Tests
IAST
Developer Training
Security Champions
We need to shift right
It’s time to consider a different
perspective
It’s time to shift right
The left is not wrong, just not right; It's time to shift right!
The left is not wrong, just not right; It's time to shift right!
Instrumentation & Visibility
To really understand what is
going on in production
TestingintheSDLC
Instrumentation
and visibility
production
Requirements, Design, Development, Build, Testing, Deployment & Production
Instrumentation provides visibility and
defense capabilities, which provides the
ability to make smart blocking decisions.
Why is this important?
● Moving to the cloud.
● Business drivers moving faster
resulting in app deployments
moving faster.
● Abstraction of infrastructure and
operations, e.g. PaaS & serverless, is
enabling faster app deployments.
Security needs to move fast too, it can
only move faster by shifting right.
Benefits
Visibility to understand the threats you’re
apps are actually facing, this becomes a
critical feedback loop to drive prioritization
of resources on the left.
Gives you an edge even with little resources -
delegate security monitoring and defend in
real time.
Visibility sharing helps build relationships
with developers.
Threat hunting.
One of the best approaches is to provide rapid feedback
to developers. In the land of application performance, we
found that running APM tools in production was a way to
help developers find places to optimize their code. This
created a feedback loop from production (the right) to
development (the left).
James Wickett ( @wickett)
https://labs.signalsciences.com/devsecops-security-shift-right
Attacks & Attack Locations
Incredible feedback for developer awareness and prioritization.
Anomalous Traffic
Sensitive or High Risk Transactions
Correlations
● Attacks + anomalous responses
● Attacks + sensitive transactions
● Logins + anomalous sources
● Sensitive transactions + anomalous sources
● Automation (Bots) + user actions
● Automation (Bots) + high risk transactions
● Distinct changes in traffic patterns
By Tony Hisgett from Birmingham, UK - Dalek 1, CC BY 2.0,
https://commons.wikimedia.org/w/index.php?curid=18985947
Principle of Known Good
● HTTP structure / attributes
● App specific parameters
○ Headers
○ GET & POST
● Device specific parameters
○ Device IDs
○ User-Agent strings
○ Client software versions
Periodically change known good
Honeypots & Deception
app
honeypot
Feeds blocking
decisions
Final Thoughts
You don’t have to shift left before shifting
right.
In fact, if you have limited resources or are
building a new AppSec program, I
recommend starting on the right first.
Let the right inform the left as you build out
your AppSec program.
Absolutely necessary for existing AppSec
programs to move faster.
Thank you - Questions?

More Related Content

PDF
Shift Left. Wait, what? No, Shift Right!!!
PDF
SecOps Armageddon: A look into the future of security & operations
PDF
CSA Raleigh application security and deception in the cloud
PDF
Deception in Cyber Security (League of Women in Cyber Security)
PPTX
Failure is inevitable but it isn't permanent
PDF
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
PDF
Shifting Security Left - The Innovation of DevSecOps - AgileDC
PDF
AppSec is Eating Security
Shift Left. Wait, what? No, Shift Right!!!
SecOps Armageddon: A look into the future of security & operations
CSA Raleigh application security and deception in the cloud
Deception in Cyber Security (League of Women in Cyber Security)
Failure is inevitable but it isn't permanent
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - AgileDC
AppSec is Eating Security

What's hot (19)

PDF
Sigma Open Tech Week: Bitter Truth About Software Security
PDF
Silver Lining for Miles: DevOps for Building Security Solutions
PPTX
Amy DeMartine - 7 Habits of Rugged DevOps
PPTX
The R.O.A.D to DevOps
PPTX
DEVSECOPS: Coding DevSecOps journey
PDF
Ops Happen: Improve Security Without Getting in the Way
PDF
What we learned from three years sciencing the crap out of devops
PDF
Collaborative security : Securing open source software
PDF
Securing 100 products - How hard can it be?
PDF
Security in agile teams
PDF
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
PPTX
The sooner the better but never too late
PDF
Security at Scale - Lessons from Six Months at Yahoo
PDF
Using security to drive chaos engineering
PPTX
В чому різниця між тестами на проникнення, аудитами, та іншими послугами з кі...
PDF
New Era of Software with modern Application Security (v0.6)
PDF
Year Zero
PDF
How to transform developers into security people
PDF
Is it Safe? measuring product security goodness
Sigma Open Tech Week: Bitter Truth About Software Security
Silver Lining for Miles: DevOps for Building Security Solutions
Amy DeMartine - 7 Habits of Rugged DevOps
The R.O.A.D to DevOps
DEVSECOPS: Coding DevSecOps journey
Ops Happen: Improve Security Without Getting in the Way
What we learned from three years sciencing the crap out of devops
Collaborative security : Securing open source software
Securing 100 products - How hard can it be?
Security in agile teams
QA Fest 2019. Володимир Стиран. Чим раніше – тим вигідніше, але ніколи не піз...
The sooner the better but never too late
Security at Scale - Lessons from Six Months at Yahoo
Using security to drive chaos engineering
В чому різниця між тестами на проникнення, аудитами, та іншими послугами з кі...
New Era of Software with modern Application Security (v0.6)
Year Zero
How to transform developers into security people
Is it Safe? measuring product security goodness
Ad

Similar to The left is not wrong, just not right; It's time to shift right! (20)

PDF
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
PDF
Software risk management
PDF
The complete guide to developer first application security By Github.Com
PDF
All About Intelligent Orchestration :The Future of DevSecOps.pdf
PDF
The complete guide to developer first application security By Github.Com
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
PPTX
How to build app sec team & culture in your organization the hack summi...
PDF
Shift Left Security – Guidance on embedding security for a Digital Transforma...
PDF
Why DevOps != the Wild West and How Embracing it Can Improve Security - RSA C...
PPTX
Introduction to DevSecOps
DOCX
10 things to get right for successful dev secops
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PPTX
Building an AppSec Team Extended Cut
PPTX
Mike Spaulding - Building an Application Security Program
PPTX
2016 - Safely Removing the Last Roadblock to Continuous Delivery
PDF
VER_WP_CrackingCode_FINAL
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PDF
PDF The complete guide to developer first application security By Github.Co...
PDF
DevOps and Devsecops What are the Differences.pdf
PPTX
Dev{sec}ops
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Software risk management
The complete guide to developer first application security By Github.Com
All About Intelligent Orchestration :The Future of DevSecOps.pdf
The complete guide to developer first application security By Github.Com
Protecting Agile Transformation through Secure DevOps (DevSecOps)
How to build app sec team & culture in your organization the hack summi...
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Why DevOps != the Wild West and How Embracing it Can Improve Security - RSA C...
Introduction to DevSecOps
10 things to get right for successful dev secops
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Building an AppSec Team Extended Cut
Mike Spaulding - Building an Application Security Program
2016 - Safely Removing the Last Roadblock to Continuous Delivery
VER_WP_CrackingCode_FINAL
Safely Removing the Last Roadblock to Continuous Delivery
PDF The complete guide to developer first application security By Github.Co...
DevOps and Devsecops What are the Differences.pdf
Dev{sec}ops
Ad

More from Phillip Maddux (7)

PDF
Application security for the modern web - ISSA South Texas Houston DevOps
PDF
Honeypots, Deception, and Frankenstein
PDF
Honeypots, Deception, and Frankenstein
PDF
HoneyPy & HoneyDB (TriPython)
PDF
HoneyPy & HoneyDB (CarolinaCon 13)
PDF
HoneyPy & HoneyDB (LASCON 2016)
PDF
HoneyPy Honeypot (OWASP Triangle Chapter)
Application security for the modern web - ISSA South Texas Houston DevOps
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
HoneyPy & HoneyDB (TriPython)
HoneyPy & HoneyDB (CarolinaCon 13)
HoneyPy & HoneyDB (LASCON 2016)
HoneyPy Honeypot (OWASP Triangle Chapter)

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

The left is not wrong, just not right; It's time to shift right!

  • 1. The left is not wrong, just not right; It’s time to shift RIGHT!
  • 2. Phillip Maddux Principle AppSec Researcher & Advisor 12 yrs AppSec in Financials IT & IT Audit prior @foospidy github.com/foospidy linkedin.pxmx.io pxmx.io
  • 3. Just in case, this is an AppSec talk, not a political talk...
  • 5. The Call To Shift Left
  • 6. The DevSecOps paradigm that we are all preaching is "Shift Security Left" e.g. design and develop your application with security in mind as early as possible and integrate security into CI/CD pipeline. - Anonymous (Anonymous as in an AppSec person in an AppSec Slack channel, not _ )
  • 7. What is this shifting left? An approach to software testing and system testing in which testing is performed earlier in the life cycle (i.e. moved left on the project timeline). It is the first half of the maxim "Test early and often." - Wikipedia In the parlance of DevOps and security, a shift left simply means that security is built into the process and designed into the application at an earlier stage of the development cycle. - SecurityRoundtable
  • 8. Shiftin’ Left Requirements, Design, Development, Build, Testing & Deployment TestingintheSDLC
  • 9. Shiftin’ Lefter Developer Training Security Champions Relationships w/Devs Achievement coins Gamification Security engineering
  • 10. Requirements, Design, Development, Build TestingintheSDLC Shiftin’ Lefter Developer Training Security Champions Relationships w/Devs Achievement coins Gamification Security engineering
  • 11. That is all good Photo by Jonathan Daniels on Unsplash
  • 12. So what is the issue?
  • 13. We’ve been doing this for years!
  • 14. SDLC Evolution to the Left Requirements, Design, Development, Build, Testing & Deployment TestingintheSDLC Pen Testing Arch Review Code Scanning Manual Code Review Dependency Checks Arch ReviewsControl Standards Security Unit Tests IAST Developer Training Security Champions
  • 15. We need to shift right It’s time to consider a different perspective
  • 16. It’s time to shift right
  • 19. Instrumentation & Visibility To really understand what is going on in production
  • 20. TestingintheSDLC Instrumentation and visibility production Requirements, Design, Development, Build, Testing, Deployment & Production Instrumentation provides visibility and defense capabilities, which provides the ability to make smart blocking decisions.
  • 21. Why is this important? ● Moving to the cloud. ● Business drivers moving faster resulting in app deployments moving faster. ● Abstraction of infrastructure and operations, e.g. PaaS & serverless, is enabling faster app deployments. Security needs to move fast too, it can only move faster by shifting right.
  • 22. Benefits Visibility to understand the threats you’re apps are actually facing, this becomes a critical feedback loop to drive prioritization of resources on the left. Gives you an edge even with little resources - delegate security monitoring and defend in real time. Visibility sharing helps build relationships with developers. Threat hunting.
  • 23. One of the best approaches is to provide rapid feedback to developers. In the land of application performance, we found that running APM tools in production was a way to help developers find places to optimize their code. This created a feedback loop from production (the right) to development (the left). James Wickett ( @wickett) https://labs.signalsciences.com/devsecops-security-shift-right
  • 24. Attacks & Attack Locations Incredible feedback for developer awareness and prioritization.
  • 26. Sensitive or High Risk Transactions
  • 27. Correlations ● Attacks + anomalous responses ● Attacks + sensitive transactions ● Logins + anomalous sources ● Sensitive transactions + anomalous sources ● Automation (Bots) + user actions ● Automation (Bots) + high risk transactions ● Distinct changes in traffic patterns By Tony Hisgett from Birmingham, UK - Dalek 1, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=18985947
  • 28. Principle of Known Good ● HTTP structure / attributes ● App specific parameters ○ Headers ○ GET & POST ● Device specific parameters ○ Device IDs ○ User-Agent strings ○ Client software versions Periodically change known good
  • 30. Final Thoughts You don’t have to shift left before shifting right. In fact, if you have limited resources or are building a new AppSec program, I recommend starting on the right first. Let the right inform the left as you build out your AppSec program. Absolutely necessary for existing AppSec programs to move faster.
  • 31. Thank you - Questions?