53
Continuous Security

Continuous Security - Thunderplains 2016

Embed Size (px)

Citation preview

Page 1: Continuous Security - Thunderplains 2016

Continuous Security

Page 2: Continuous Security - Thunderplains 2016

adam_baldwinevilpacket

Page 3: Continuous Security - Thunderplains 2016
Page 4: Continuous Security - Thunderplains 2016

Node Security Project

Page 5: Continuous Security - Thunderplains 2016
Page 6: Continuous Security - Thunderplains 2016
Page 7: Continuous Security - Thunderplains 2016
Page 8: Continuous Security - Thunderplains 2016
Page 9: Continuous Security - Thunderplains 2016
Page 10: Continuous Security - Thunderplains 2016
Page 11: Continuous Security - Thunderplains 2016
Page 12: Continuous Security - Thunderplains 2016
Page 13: Continuous Security - Thunderplains 2016

What is Continuous Security?

Page 14: Continuous Security - Thunderplains 2016
Page 15: Continuous Security - Thunderplains 2016
Page 16: Continuous Security - Thunderplains 2016
Page 17: Continuous Security - Thunderplains 2016

-Keep Vulnerabilities out of Production

-Don't ignore Production Code

-Shift Security Culture

Page 18: Continuous Security - Thunderplains 2016

Keep Vulnerabilities out of Production

Page 19: Continuous Security - Thunderplains 2016

productiondevelopment risk

Page 20: Continuous Security - Thunderplains 2016

productiondevelopment risk

Page 21: Continuous Security - Thunderplains 2016
Page 22: Continuous Security - Thunderplains 2016
Page 23: Continuous Security - Thunderplains 2016

Design / Threat ModelingTHREAT PROPERTY VIOLATED

Spoofing Authentication

Tampering Integrity

Repudiation Non-Repudiation

Info Disclosure Confidentiality

Denial of Service Availability

Elevation of Privilege Authorization

Threat Modeling -Designing for Security, 2014

Page 24: Continuous Security - Thunderplains 2016

The 100% Test Coverage MythThinking Beyond Tests

Page 25: Continuous Security - Thunderplains 2016

Challenge assumptions

Page 26: Continuous Security - Thunderplains 2016
Page 27: Continuous Security - Thunderplains 2016

Demo?

Page 28: Continuous Security - Thunderplains 2016

Pull Request Reviews- What sources & sinks were added - What new dependencies - What new technologies were added - What new behaviors are introduced / change

Page 29: Continuous Security - Thunderplains 2016

Automation

Page 30: Continuous Security - Thunderplains 2016

npm i nsp -g cd your-fantastic-project nsp check(+) 1 vulnerability found ┌───────────────┬───────────────────────────────────────────────────────────────────────────┐ │ │ SQL Injection due to unescaped object keys │ ├───────────────┼───────────────────────────────────────────────────────────────────────────┤ │ Name │ mysql │ ├───────────────┼───────────────────────────────────────────────────────────────────────────┤ │ Installed │ 2.0.0-alpha3 │ ├───────────────┼───────────────────────────────────────────────────────────────────────────┤ │ Vulnerable │ <=v2.0.0-alpha7 │ ├───────────────┼───────────────────────────────────────────────────────────────────────────┤ │ Patched │ >=v2.0.0-alpha8 │ ├───────────────┼───────────────────────────────────────────────────────────────────────────┤ │ Path │ [email protected] > [email protected] > [email protected] │ ├───────────────┼───────────────────────────────────────────────────────────────────────────┤ │ More Info │ https://nodesecurity.io/advisories/66 │ └───────────────┴───────────────────────────────────────────────────────────────────────────┘

Page 31: Continuous Security - Thunderplains 2016

Stay in your workflow

Page 32: Continuous Security - Thunderplains 2016
Page 33: Continuous Security - Thunderplains 2016
Page 34: Continuous Security - Thunderplains 2016

Production CodeDevSecOps

Page 35: Continuous Security - Thunderplains 2016

Actively engage production code

Page 36: Continuous Security - Thunderplains 2016

Monitoring

Page 37: Continuous Security - Thunderplains 2016

Monitoring

Page 38: Continuous Security - Thunderplains 2016

Tools.

http://pre14.deviantart.net/4b02/th/pre/i/2013/352/6/4/shaving_cream_from_jurassic_park_by_aleg8r-d6yfj5i.png

Page 39: Continuous Security - Thunderplains 2016

SSL Labs

Page 40: Continuous Security - Thunderplains 2016

securityheaders.io

Page 41: Continuous Security - Thunderplains 2016

securityheaders.io

Page 42: Continuous Security - Thunderplains 2016

Internal Bug Hunts

Page 43: Continuous Security - Thunderplains 2016

Penetration Testing

Page 44: Continuous Security - Thunderplains 2016

Penetration Testing

Page 45: Continuous Security - Thunderplains 2016

Shifting Security Culturepain & persistance

Page 46: Continuous Security - Thunderplains 2016

It usually happens when pain is felt

Page 47: Continuous Security - Thunderplains 2016

Improvement Resistance

Threat Modeling Complicated, Time consuming

Deeper Pull Request Reviews Complacency

Automation Cost, Time

Penetration Testing Cost, What if's

???

Page 48: Continuous Security - Thunderplains 2016

It has to happen from within *

Page 49: Continuous Security - Thunderplains 2016

It has to have

support from the

right people

Page 50: Continuous Security - Thunderplains 2016

Top down security

Page 51: Continuous Security - Thunderplains 2016

Be patientIt does not happen over over night.

Page 52: Continuous Security - Thunderplains 2016
Page 53: Continuous Security - Thunderplains 2016

</presentation>adam_baldwinevilpacket