put yourself in the #appsec pipeline

25
Put yourself in the #appsec pipeline

Upload: paolo-perego

Post on 09-Feb-2017

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Put yourself in the #appsec pipeline

Put yourself in the #appsec pipeline

Page 2: Put yourself in the #appsec pipeline

Change your Yahoo Password now (ymail, flickr, …)!

http://www.usatoday.com/story/tech/2016/09/22/report-yahoo-may-confirm-massive-data-breach/90824934/

Page 3: Put yourself in the #appsec pipeline

$ whoami• Application security engineer 15

years in #appsec industry

• Tech blogger @codiceinsicuro

• Love writing security source code scanners (Owasp Orizon, dawnscanner)

• Love talking about application security

• #appsec tweets available at @thesp0nge

Page 4: Put yourself in the #appsec pipeline

Agenda

• Talk about testing scenarios

• Talk about what an appsec pipe is and what do you need to create one

• Be inspired, go home and do some homework

Page 5: Put yourself in the #appsec pipeline

What do I have to test?

Page 6: Put yourself in the #appsec pipeline
Page 7: Put yourself in the #appsec pipeline

Testing scenarios

Page 8: Put yourself in the #appsec pipeline

We don’t do any test(and we are aware of it)

Page 9: Put yourself in the #appsec pipeline

We don’t do any test (but I’ll love to do)

Page 10: Put yourself in the #appsec pipeline

We do security test(but I want to learn more about the pipeline)

Page 11: Put yourself in the #appsec pipeline

How do we perform security tests?

Page 12: Put yourself in the #appsec pipeline

The unacceptable solution…

• Tests must be done:

• in production environment

• before going live

• Testers need:

• the code being frozen

• some “fake” accounts

• a couple of week to do the job

Page 13: Put yourself in the #appsec pipeline

… for a difficult task• Products can not delay time to market

release to allow security tests

• Tests must be performed on each release

• Often companies do releases on a weekly basis

• There are no fake accounts on a production server

• Code is never on a frozen state

• This applies to web properties and mobile applications

• Tests are not sawn as investment

Page 14: Put yourself in the #appsec pipeline

#appsec can’t be done this wayand we’re the first talking our science to the next level

Page 15: Put yourself in the #appsec pipeline

The application security pipeline

Page 16: Put yourself in the #appsec pipeline

Before we start

• We need

• Commitment

• An organised SDLC

• A development team aware about #appsec topic

• An #appsec team (with patience and some coding skills)

Page 17: Put yourself in the #appsec pipeline

Then we can build the #appsec pipeline(https://www.owasp.org/index.php/OWASP_AppSec_Pipeline)

Page 18: Put yourself in the #appsec pipeline

The collector toolA way for our customer to ask for services, keep track about the progress

and having results back

Page 19: Put yourself in the #appsec pipeline

Your favourite collection of #appsec toolsYou may want to cover vulnerability assessment, penetration test, web application

penetration test and code review at least. Keep calm and let’s go shopping.

Page 20: Put yourself in the #appsec pipeline

The OrchestratorYour customers ask for services, you need an automatic dispatcher mechanism to

the appropriate tool. Of course you need also something retrieving results too.

Page 21: Put yourself in the #appsec pipeline

The ticketing systemYou need something to keep track about vulnerabilities, about their history

and their state.

Page 22: Put yourself in the #appsec pipeline

The Workflow(Glue all together)

Page 23: Put yourself in the #appsec pipeline

Bonus track - some useful tools

Page 24: Put yourself in the #appsec pipeline

Some tools to check• Sinatra with Grape (create HTTP API

endpoints)

• Owasp ZAP (WAPT on steroids)

• Owasp DeepViolet (check your SSL config)

• Nexpose + nexpose gem (automate vulnerability assessment)

• Brakeman/Dawnscanner (ultimate ruby code review)

• Owasp Orizon (Java security code review)

• Owasp GLUE gem (pipeline related tool)

Page 25: Put yourself in the #appsec pipeline

THANKS!