SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Secure Salesforce
Chimera
External Integration Security
​ Tim Bach
​ Product Security Engineer
​ Salesforce
​ Travis Safford
​ Product Security Engineer
​ Salesforce
Tim Bach
Product Security Engineer
Travis Safford
Product Security Engineer
Secure Salesforce
Dreamforce 2015
Overview
​  What is the AppExchange Security Review process?
​  Why does external application security matter?
​  Goals for Chimera
​  What can Chimera do for you?
​  Demo!
​  Chimera technical overview
​  What’s coming next [week / month / quarter / year]?
​  Q&A
Security Review Process Overview
The AppExchange
1-slide primer
​  The Salesforce App Marketplace
​  Independent Software Vendors (ISV’s) build and list apps for
customers to install & expand the platform’s capabilities
​  Apps may be platform-only or interface with external web
systems, mobile apps, and desktop software
​  Currently, 2,800+ apps available for free or for purchase
​  Apps may have scoped or total access to users and/or data
within the Salesforce org they are installed in or
authenticated against
​  Apps listed on the AppExchange must undergo a rigorous
Security Review by the Product Security team and regular re-
reviews
AppExchange Security Review
​  Managed by the Salesforce Product Security team
​  Comprehensive security audit and penetration test of the application
​  Partner/ISV provides automated code and application security scans – repeat this process until
automated scanners find nothing or only false positives
​  Partners are provided with ZAP (previously Burp Suite), which they must install and configure
before using to run a web application security test against their application
​  Product Security reviews scan results and application code
​  In the case of external systems/software connecting to the platform, full penetration test
AppExchange Security Review
External Threats
Why is Security Review Important?
ZAP
What is it? How do partners use it?
Introducing Chimera
Chimera
What and why?
​ Chimera (mythology):
​  …a monstrous fire-breathing hybrid creature composed of the parts…
​ Chimera (genetics):
…a single organism composed of genetically distinct cells…
​ Chimera (Salesforce): A web security scanner composed of parts of the best open-source scanning,
analysis, and fingerprinting tools available today. Consolidated and analyzed by purpose-built code and
powered on the Heroku platform for massive scalability.
“
”
Chimera
​  A fully featured, cloud-based security scanner
​  Fire-and-forget scanning – just give it a target
​  Made up of multiple industry-standard security tools
​  Free for all AppExchange ISV’s for the life of their AppExchange offering
Chimera Goals
​  Give partners and ISV’s better tools that make it easier to become secure
​  Reduce confusion and delay in the Security Review process
​  Use our resources to make security easier for our AppExchange partners
​  Drive down the number of tests it takes a partner to pass Security Review and allow them to
get to market faster on the AppExchange
​  Promote the security of the AppExchange ecosystem
Let’s start a scan…
What are we scanning with?
​  A variety of open-source tools as well as some internally developed ones
​  ZAP – general web application security scanner
​  Nikto – web application vulnerability scanner
​  SSLyze – SSL vulnerability scanner
​  nmap – port scanner
​  Plus: SSL fingerprinting, web application fingerprinting
Background Magic
​  Chimera isn’t just running scans and sending you raw results files
​  After all scans complete on your target, Chimera correlates all results into a single report
​  Report includes remediation steps for you to resolve issues between scans
​  Chimera will remove duplicate issues as much as possible to provide you with an accurate and
actionable report
​  Thanks to Heroku, Chimera scales based on activity
​  Even around the Dreamforce AppExchange spike, you won’t be waiting long
Chimera Technology
​  Chimera’s scanners are entirely Heroku-based
​  Architecture allows for massive scaling
​  Portal to submit scans and receive results is Force platform-based, allowing for integration with
existing Partner portal and AppExchange accounts
​  Chimera core code + internal components are written in mostly Python
Get Started!
​  Chimera will be live on October 1st, 2015
​  Links will be live on DeveloperForce - Security
What’s Next?
Future Work
We’re not done yet!
​  Chimera will become the primary means of preparing for Security Review
​  We want to go one step further towards promoting partner security
​  As Chimera becomes more stable, we’ll start to experiment with automatic, periodic scans of
live offerings to ensure continuous security for partners and customers
​  Threat intelligence and proactive vulnerability notification will become possible for our
partners at no cost or burden to them – ensuring partner success on the platform
Demo Scan Complete
​  Let’s take a look at that scan that we kicked off earlier…
Thank you
http://sforce.co/1HHrjRL

Contenu connexe

Tendances

Oracle application express ppt
Oracle application express pptOracle application express ppt
Oracle application express ppt
Abhinaw Kumar
 
How To Embed SlideShare Shows Into WordPress.com
How To Embed SlideShare Shows Into WordPress.comHow To Embed SlideShare Shows Into WordPress.com
How To Embed SlideShare Shows Into WordPress.com
Kathy Gill
 

Tendances (20)

Episode 20 - Trigger Frameworks in Salesforce
Episode 20 - Trigger Frameworks in SalesforceEpisode 20 - Trigger Frameworks in Salesforce
Episode 20 - Trigger Frameworks in Salesforce
 
Exploring the Salesforce REST API
Exploring the Salesforce REST APIExploring the Salesforce REST API
Exploring the Salesforce REST API
 
Salesforce talk
Salesforce talkSalesforce talk
Salesforce talk
 
Salesforce crm projects
Salesforce crm projects Salesforce crm projects
Salesforce crm projects
 
Salesforce APIs
Salesforce APIsSalesforce APIs
Salesforce APIs
 
Postman & API Testing by Amber Race
Postman & API Testing by Amber RacePostman & API Testing by Amber Race
Postman & API Testing by Amber Race
 
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
Salesforce Training For Beginners | Salesforce Tutorial | Salesforce Training...
 
Oracle application express ppt
Oracle application express pptOracle application express ppt
Oracle application express ppt
 
Introduction to Force.com Canvas Apps
Introduction to Force.com Canvas AppsIntroduction to Force.com Canvas Apps
Introduction to Force.com Canvas Apps
 
Best Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdfBest Practices with Apex in 2022.pdf
Best Practices with Apex in 2022.pdf
 
Custom policies in mule 4 and a circuit breaker example
Custom policies in mule 4 and a circuit breaker exampleCustom policies in mule 4 and a circuit breaker example
Custom policies in mule 4 and a circuit breaker example
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model
 
Introduction to lightning web component
Introduction to lightning web component Introduction to lightning web component
Introduction to lightning web component
 
Workshop: An Introduction to API Automation with Javascript
Workshop: An Introduction to API Automation with JavascriptWorkshop: An Introduction to API Automation with Javascript
Workshop: An Introduction to API Automation with Javascript
 
Lightning Web Component - LWC
Lightning Web Component - LWCLightning Web Component - LWC
Lightning Web Component - LWC
 
Lightning Components Introduction
Lightning Components IntroductionLightning Components Introduction
Lightning Components Introduction
 
Demystify Salesforce Bulk API
Demystify Salesforce Bulk APIDemystify Salesforce Bulk API
Demystify Salesforce Bulk API
 
Salesforce Presentation
Salesforce PresentationSalesforce Presentation
Salesforce Presentation
 
How To Embed SlideShare Shows Into WordPress.com
How To Embed SlideShare Shows Into WordPress.comHow To Embed SlideShare Shows Into WordPress.com
How To Embed SlideShare Shows Into WordPress.com
 
Dive Deep Into the Force.com Canvas Framework
Dive Deep Into the Force.com Canvas FrameworkDive Deep Into the Force.com Canvas Framework
Dive Deep Into the Force.com Canvas Framework
 

Similaire à Secure Salesforce: External Integration Security with Chimera

Similaire à Secure Salesforce: External Integration Security with Chimera (20)

ApExchange Security Review and Compliance
ApExchange Security Review and ComplianceApExchange Security Review and Compliance
ApExchange Security Review and Compliance
 
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)
 
Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...Static Application Security Testing Strategies for Automation and Continuous ...
Static Application Security Testing Strategies for Automation and Continuous ...
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Prancer Enterprise announces today the release of the Zero Trust Security Val...
Prancer Enterprise announces today the release of the Zero Trust Security Val...Prancer Enterprise announces today the release of the Zero Trust Security Val...
Prancer Enterprise announces today the release of the Zero Trust Security Val...
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security Agile
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
 
Agile and Secure Development
Agile and Secure DevelopmentAgile and Secure Development
Agile and Secure Development
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
How automation can help boost security
How automation can help boost securityHow automation can help boost security
How automation can help boost security
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
 
Security Validation
Security ValidationSecurity Validation
Security Validation
 
10 Steps To Secure Agile Development
10 Steps To Secure Agile Development10 Steps To Secure Agile Development
10 Steps To Secure Agile Development
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 

Plus de Salesforce Developers

Plus de Salesforce Developers (20)

Maximizing Salesforce Lightning Experience and Lightning Component Performance
Maximizing Salesforce Lightning Experience and Lightning Component PerformanceMaximizing Salesforce Lightning Experience and Lightning Component Performance
Maximizing Salesforce Lightning Experience and Lightning Component Performance
 
Local development with Open Source Base Components
Local development with Open Source Base ComponentsLocal development with Open Source Base Components
Local development with Open Source Base Components
 
TrailheaDX India : Developer Highlights
TrailheaDX India : Developer HighlightsTrailheaDX India : Developer Highlights
TrailheaDX India : Developer Highlights
 
Why developers shouldn’t miss TrailheaDX India
Why developers shouldn’t miss TrailheaDX IndiaWhy developers shouldn’t miss TrailheaDX India
Why developers shouldn’t miss TrailheaDX India
 
CodeLive: Build Lightning Web Components faster with Local Development
CodeLive: Build Lightning Web Components faster with Local DevelopmentCodeLive: Build Lightning Web Components faster with Local Development
CodeLive: Build Lightning Web Components faster with Local Development
 
CodeLive: Converting Aura Components to Lightning Web Components
CodeLive: Converting Aura Components to Lightning Web ComponentsCodeLive: Converting Aura Components to Lightning Web Components
CodeLive: Converting Aura Components to Lightning Web Components
 
Enterprise-grade UI with open source Lightning Web Components
Enterprise-grade UI with open source Lightning Web ComponentsEnterprise-grade UI with open source Lightning Web Components
Enterprise-grade UI with open source Lightning Web Components
 
TrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer HighlightsTrailheaDX and Summer '19: Developer Highlights
TrailheaDX and Summer '19: Developer Highlights
 
Live coding with LWC
Live coding with LWCLive coding with LWC
Live coding with LWC
 
Lightning web components - Episode 4 : Security and Testing
Lightning web components  - Episode 4 : Security and TestingLightning web components  - Episode 4 : Security and Testing
Lightning web components - Episode 4 : Security and Testing
 
LWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura InteroperabilityLWC Episode 3- Component Communication and Aura Interoperability
LWC Episode 3- Component Communication and Aura Interoperability
 
Lightning web components episode 2- work with salesforce data
Lightning web components   episode 2- work with salesforce dataLightning web components   episode 2- work with salesforce data
Lightning web components episode 2- work with salesforce data
 
Lightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An IntroductionLightning web components - Episode 1 - An Introduction
Lightning web components - Episode 1 - An Introduction
 
Migrating CPQ to Advanced Calculator and JSQCP
Migrating CPQ to Advanced Calculator and JSQCPMigrating CPQ to Advanced Calculator and JSQCP
Migrating CPQ to Advanced Calculator and JSQCP
 
Scale with Large Data Volumes and Big Objects in Salesforce
Scale with Large Data Volumes and Big Objects in SalesforceScale with Large Data Volumes and Big Objects in Salesforce
Scale with Large Data Volumes and Big Objects in Salesforce
 
Replicate Salesforce Data in Real Time with Change Data Capture
Replicate Salesforce Data in Real Time with Change Data CaptureReplicate Salesforce Data in Real Time with Change Data Capture
Replicate Salesforce Data in Real Time with Change Data Capture
 
Modern Development with Salesforce DX
Modern Development with Salesforce DXModern Development with Salesforce DX
Modern Development with Salesforce DX
 
Get Into Lightning Flow Development
Get Into Lightning Flow DevelopmentGet Into Lightning Flow Development
Get Into Lightning Flow Development
 
Integrate CMS Content Into Lightning Communities with CMS Connect
Integrate CMS Content Into Lightning Communities with CMS ConnectIntegrate CMS Content Into Lightning Communities with CMS Connect
Integrate CMS Content Into Lightning Communities with CMS Connect
 
Introduction to MuleSoft
Introduction to MuleSoftIntroduction to MuleSoft
Introduction to MuleSoft
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Secure Salesforce: External Integration Security with Chimera

  • 1. Secure Salesforce Chimera External Integration Security ​ Tim Bach ​ Product Security Engineer ​ Salesforce ​ Travis Safford ​ Product Security Engineer ​ Salesforce
  • 5. Overview ​  What is the AppExchange Security Review process? ​  Why does external application security matter? ​  Goals for Chimera ​  What can Chimera do for you? ​  Demo! ​  Chimera technical overview ​  What’s coming next [week / month / quarter / year]? ​  Q&A
  • 7. The AppExchange 1-slide primer ​  The Salesforce App Marketplace ​  Independent Software Vendors (ISV’s) build and list apps for customers to install & expand the platform’s capabilities ​  Apps may be platform-only or interface with external web systems, mobile apps, and desktop software ​  Currently, 2,800+ apps available for free or for purchase ​  Apps may have scoped or total access to users and/or data within the Salesforce org they are installed in or authenticated against ​  Apps listed on the AppExchange must undergo a rigorous Security Review by the Product Security team and regular re- reviews
  • 8. AppExchange Security Review ​  Managed by the Salesforce Product Security team ​  Comprehensive security audit and penetration test of the application ​  Partner/ISV provides automated code and application security scans – repeat this process until automated scanners find nothing or only false positives ​  Partners are provided with ZAP (previously Burp Suite), which they must install and configure before using to run a web application security test against their application ​  Product Security reviews scan results and application code ​  In the case of external systems/software connecting to the platform, full penetration test
  • 10. External Threats Why is Security Review Important?
  • 11. ZAP What is it? How do partners use it?
  • 13. Chimera What and why? ​ Chimera (mythology): ​  …a monstrous fire-breathing hybrid creature composed of the parts… ​ Chimera (genetics): …a single organism composed of genetically distinct cells… ​ Chimera (Salesforce): A web security scanner composed of parts of the best open-source scanning, analysis, and fingerprinting tools available today. Consolidated and analyzed by purpose-built code and powered on the Heroku platform for massive scalability. “ ”
  • 14. Chimera ​  A fully featured, cloud-based security scanner ​  Fire-and-forget scanning – just give it a target ​  Made up of multiple industry-standard security tools ​  Free for all AppExchange ISV’s for the life of their AppExchange offering
  • 15. Chimera Goals ​  Give partners and ISV’s better tools that make it easier to become secure ​  Reduce confusion and delay in the Security Review process ​  Use our resources to make security easier for our AppExchange partners ​  Drive down the number of tests it takes a partner to pass Security Review and allow them to get to market faster on the AppExchange ​  Promote the security of the AppExchange ecosystem
  • 16. Let’s start a scan…
  • 17. What are we scanning with? ​  A variety of open-source tools as well as some internally developed ones ​  ZAP – general web application security scanner ​  Nikto – web application vulnerability scanner ​  SSLyze – SSL vulnerability scanner ​  nmap – port scanner ​  Plus: SSL fingerprinting, web application fingerprinting
  • 18. Background Magic ​  Chimera isn’t just running scans and sending you raw results files ​  After all scans complete on your target, Chimera correlates all results into a single report ​  Report includes remediation steps for you to resolve issues between scans ​  Chimera will remove duplicate issues as much as possible to provide you with an accurate and actionable report ​  Thanks to Heroku, Chimera scales based on activity ​  Even around the Dreamforce AppExchange spike, you won’t be waiting long
  • 19. Chimera Technology ​  Chimera’s scanners are entirely Heroku-based ​  Architecture allows for massive scaling ​  Portal to submit scans and receive results is Force platform-based, allowing for integration with existing Partner portal and AppExchange accounts ​  Chimera core code + internal components are written in mostly Python
  • 20. Get Started! ​  Chimera will be live on October 1st, 2015 ​  Links will be live on DeveloperForce - Security
  • 22. We’re not done yet! ​  Chimera will become the primary means of preparing for Security Review ​  We want to go one step further towards promoting partner security ​  As Chimera becomes more stable, we’ll start to experiment with automatic, periodic scans of live offerings to ensure continuous security for partners and customers ​  Threat intelligence and proactive vulnerability notification will become possible for our partners at no cost or burden to them – ensuring partner success on the platform
  • 23. Demo Scan Complete ​  Let’s take a look at that scan that we kicked off earlier…