SlideShare une entreprise Scribd logo
1  sur  111
Télécharger pour lire hors ligne
AppSec in a DevOps World
SHAUN GORDON
NEW RELIC DIRECTOR OF INFORMATION SECURITY & COMPLIANCE
OCTOBER 23, 2013

Wednesday, November 6, 13
Wednesday, November 6, 13
Speed

Wednesday, November 6, 13
Speed

Security
Wednesday, November 6, 13
Speed
vs.
Security
Wednesday, November 6, 13
Wednesday, November 6, 13
Accelerating Development Cycles

Wednesday, November 6, 13
Accelerating Development Cycles
Boxed Software
Waterfall
1 Year

Wednesday, November 6, 13
Accelerating Development Cycles
Web 1.0
3 months Waterfall

Wednesday, November 6, 13
Accelerating Development Cycles

4 week

Wednesday, November 6, 13

Web 2.0
Agile
Accelerating Development Cycles

2x week

DevOps

Wednesday, November 6, 13
Accelerating Development Cycles

daily

Continuous
Deployment
DevOps

Wednesday, November 6, 13
Accelerating Development Cycles

hourly

Wednesday, November 6, 13

Continuous
Deployment
DevOps
Accelerating Development Cycles

hourly

Wednesday, November 6, 13

Continuous
Deployment
DevOps
Accelerating Development Cycles

3 months Waterfall
Agile
4 week

Wednesday, November 6, 13
Accelerating Development Cycles

3 months Waterfall
Agile
4 week

Wednesday, November 6, 13
Accelerating Development Cycles

daily
hourly

Wednesday, November 6, 13

Continuous
Deployment
DevOps
Traditional (Waterfall) SDLC
Requirements

Wednesday, November 6, 13

Design

Development

Tes2ng

Release

Produc2on
Traditional (Waterfall) SDLC
Requirements

Design

Development

Tes2ng

Release

Define functional (features) and nonfunctional requirements (capabilities)

Wednesday, November 6, 13

Produc2on
Traditional (Waterfall) SDLC
Requirements

Design

Development

Tes2ng

Release

Translate requirements into
architecture and detailed design

Wednesday, November 6, 13

Produc2on
Traditional (Waterfall) SDLC
Requirements

Design

Development

Tes2ng

Build it!

Wednesday, November 6, 13

Release

Produc2on
Traditional (Waterfall) SDLC
Requirements

Design

Development

Tes2ng

Release

Produc2on

Ensure functional and non-functional
requirements

Wednesday, November 6, 13
Traditional (Waterfall) SDLC
Requirements

Design

Development

Tes2ng

Ship or push live

Wednesday, November 6, 13

Release

Produc2on
Traditional (Waterfall) SDLC
Requirements

Design

Development

Tes2ng

Release

Maintain and patch as needed

Wednesday, November 6, 13

Produc2on
Traditional (Waterfall) SDLC Security
Wednesday, November 6, 13
Checkpoints
Controls
Formal Processes

Traditional (Waterfall) SDLC Security
Wednesday, November 6, 13
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Wednesday, November 6, 13

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Traditional (Waterfall) SDLC Security
Requirements

•

Functional &
Non-Functional
security
requirement

Design

•
•

Architectural
Review
Threat Modeling

Development

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

Release

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security

Wednesday, November 6, 13
Continuous Deployment Security
Requirements
Low to No friction (can’t slow us down)
Transparent
No significant changes to development processes
Make us More Secure

Wednesday, November 6, 13
Continuous Deployment Security
Requirements

Strategies & Tactics

Low to No friction (can’t slow us down)

Automation

Transparent

Training & Empowerment

No significant changes to development processes

Lightweight Processes

Make us More Secure

Triage
Quickly Detect & Respond

Wednesday, November 6, 13
Traditional (Waterfall) SDLC Security
Requirements

• Functional &
Non-Functional
security
requirement

Design

• Architectural
•

Review
Threat Modeling

Development

• Secure Coding
•
•

Practices
Static Analysis
White Box
Testing

Testing

• Dynamic
•

• Separation

Analysis
Requirements
Testing

Release

• Penetration
•
•

Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

• Vulnerability
•

Scanning
Penetration
Testing
Continuous Deployment Security
Requirements

• Functional &
Non-Functional
security
requirement

Design

• Architectural
•

Review
Threat Modeling

Development

• Secure Coding
•
•

Practices
Static Analysis
White Box
Testing

Testing

• Dynamic
•

• Separation

Analysis
Requirements
Testing

Release

• Penetration
•
•

Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

• Vulnerability
•

Scanning
Penetration
Testing
Continuous Deployment Security
Requirements

• Functional &
Non-Functional
security
requirement

Design

• Architectural
•

Review
Threat Modeling

Development

• Secure Coding
•
•

Practices
Static Analysis
White Box
Testing

Testing

• Dynamic
•

• Separation

Analysis
Requirements
Testing

Release

• Penetration
•
•

Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

• Vulnerability
•

Scanning
Penetration
Testing
Continuous Deployment Security
Requirements
Design
Requirements & Design

• Functional &
Non-Functional
security
requirement

• Architectural
•

Review
Threat Modeling

Development
Development, Testing & Release Release
Testing,

• Secure Coding
•
•

Practices
Static Analysis
White Box
Testing

• Dynamic
•

• Separation

Analysis
Requirements
Testing

• Penetration
•
•

Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

• Vulnerability
•

Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Functional &
Non-Functional
security
requirement

•
•

Architectural
Review
Threat Modeling

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Functional &
Non-Functional
security
requirement

•
•

Architectural
Review
Threat Modeling

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Threat Modeling

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Required Security Evaluation

< 25 Minute Meeting
1.Technical Overview
2.Business Context
3.Developer Concerns
Wednesday, November 6, 13
Security Evaluation Outcomes

Wednesday, November 6, 13
Security Evaluation Outcomes

• Low Risk
• Simple
Guidance

Wednesday, November 6, 13
Security Evaluation Outcomes

• Higher Risk
• Deep Dive
• Whiteboarding
• Threat Model
Wednesday, November 6, 13
Security Evaluation Follow-Up

Wednesday, November 6, 13
Security Evaluation Follow-Up

• Document
• Follow Up

Wednesday, November 6, 13
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Threat Modeling

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Threat Modeling

Wednesday, November 6, 13
Threat Modeling
Identify your assets and the
threats against them

Wednesday, November 6, 13
Threat Modeling
Identify your assets and the
threats against them
Focus your resources on the
greatest risks
Wednesday, November 6, 13
Threat Modeling @ New Relic

Wednesday, November 6, 13
Threat Modeling @ New Relic
Decompose your Application

Wednesday, November 6, 13
Threat Modeling @ New Relic
Decompose your Application
Identify your Assets

Wednesday, November 6, 13
Threat Modeling @ New Relic
Decompose your Application
Identify your Assets
Enumerate your Threats

Wednesday, November 6, 13
Threat Modeling @ New Relic
Decompose your Application
Identify your Assets
Enumerate your Threats
Rate & Rank your Threats
Wednesday, November 6, 13
Threat Modeling @ New Relic
Decompose your Application
Identify your Assets
Enumerate your Threats
Rate & Rank your Threats
Address or Accept
Wednesday, November 6, 13
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•

Secure Coding
Practices
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Secure Libraries & Services
Authentication Service
Security Event Logging Service
Input Validation Regex Patterns
Encryption Libraries
Wednesday, November 6, 13
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Brakeman
+
Jenkins

brakemanscanner.org
Wednesday, November 6, 13
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
White Box
Testing

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

•
•

• Separation

Dynamic
Analysis
Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•

Vulnerability
Scanning
Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
•

• Separation

Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
•

• Separation

Requirements
Testing

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Penetration
Testing
Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

•

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Security
Assessment
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Automated
Commit Triage
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Triage Process

Dangerous Methods
Sensitive Modules
Security Keywords

Wednesday, November 6, 13
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Automated
Commit Triage
Security SignOff

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Separation

•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

of Duties
• Management Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

• Accountability
• Management

Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

• Accountability
• Management

Release Sign-Off
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

• Accountability
• Sidekick

Process
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Wednesday, November 6, 13
Wednesday, November 6, 13
Wednesday, November 6, 13
Two Sets of (masked) eyes on every change
Wednesday, November 6, 13
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

• Accountability
• Sidekick

Process
• Limits on Production Access

Wednesday, November 6, 13

Production

Development, Testing, & Release

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Accountability
• Sidekick

Process
• Enabling Tools

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•

Required Security Evaluation

•

Lightweight
Targeted
Threat Modeling

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production

• Accountability
• Sidekick

Process
• Enabling Tools

Wednesday, November 6, 13

Production

Development, Testing, & Release

•
•
•

Automated
Commit Triage
Quick Detection
& Recovery

Penetration
Testing
Continuous Deployment Security
Requirements & Design

•
•

Required Security Evaluation
Lightweight
Targeted
Threat Modeling

Development, Testing, & Release

•
•
•
•

Secure Coding
Practices
Security
Libraries &
Services
Automated
Static Analysis
Testing Tools &
Training

• Continuous Scanning in Test, Staging, & Production
• Automated
• Penetration
Commit Triage
Testing
Quick Detection
•
& Recovery

• Accountability
• Sidekick

Process
• Enabling Tools

Wednesday, November 6, 13

Production
Powered By...

Wednesday, November 6, 13
Powered By...
Automation
Training & Empowerment
Lightweight Processes
Triage
Quick Detection & Response

Wednesday, November 6, 13
Auditors

Wednesday, November 6, 13
Auditors
Compensating Controls

Wednesday, November 6, 13
Auditors
Compensating Controls
Tell the Story

Wednesday, November 6, 13
Thank You!

Wednesday, November 6, 13
Thank You!

shaun@newrelic.com
security@newrelic.com

Wednesday, November 6, 13
Image Attribution
Slide	
  14
Checkpoint	
  Rheinpark	
  by	
  
h1p://www.flickr.com/photos/kecko/3179561892/

Wednesday, November 6, 13

Contenu connexe

Plus de New Relic

7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at ScaleNew Relic
 
7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at ScaleNew Relic
 
New Relic University at Future Stack Tokyo 2019
New Relic University at Future Stack Tokyo 2019New Relic University at Future Stack Tokyo 2019
New Relic University at Future Stack Tokyo 2019New Relic
 
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...New Relic
 
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
FutureStack  Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...FutureStack  Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...New Relic
 
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖をFutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖をNew Relic
 
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...New Relic
 
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏New Relic
 
Three Monitoring Mistakes and How to Avoid Them
Three Monitoring Mistakes and How to Avoid ThemThree Monitoring Mistakes and How to Avoid Them
Three Monitoring Mistakes and How to Avoid ThemNew Relic
 
Intro to Multidimensional Kubernetes Monitoring
Intro to Multidimensional Kubernetes MonitoringIntro to Multidimensional Kubernetes Monitoring
Intro to Multidimensional Kubernetes MonitoringNew Relic
 
FS18 Chicago Keynote
FS18 Chicago Keynote FS18 Chicago Keynote
FS18 Chicago Keynote New Relic
 
10 Things You Can Do With New Relic - Number 9 Will Shock You
10 Things You Can Do With New Relic - Number 9 Will Shock You10 Things You Can Do With New Relic - Number 9 Will Shock You
10 Things You Can Do With New Relic - Number 9 Will Shock YouNew Relic
 
Ground Rules for Code Reviews
Ground Rules for Code ReviewsGround Rules for Code Reviews
Ground Rules for Code ReviewsNew Relic
 
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...New Relic
 
Monitor all your Kubernetes and EKS stack with New Relic
Monitor all your Kubernetes and EKS stack with New Relic	Monitor all your Kubernetes and EKS stack with New Relic
Monitor all your Kubernetes and EKS stack with New Relic New Relic
 
Host for the Most: Cloud Cost Optimization
Host for the Most: Cloud Cost OptimizationHost for the Most: Cloud Cost Optimization
Host for the Most: Cloud Cost OptimizationNew Relic
 
New Relic Infrastructure in the Real World: AWS
New Relic Infrastructure in the Real World: AWSNew Relic Infrastructure in the Real World: AWS
New Relic Infrastructure in the Real World: AWSNew Relic
 
Best Practices for Measuring your Code Pipeline
Best Practices for Measuring your Code PipelineBest Practices for Measuring your Code Pipeline
Best Practices for Measuring your Code PipelineNew Relic
 
Top Three Mistakes People Make with Monitoring
Top Three Mistakes People Make with MonitoringTop Three Mistakes People Make with Monitoring
Top Three Mistakes People Make with MonitoringNew Relic
 

Plus de New Relic (20)

7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale
 
7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale
 
New Relic University at Future Stack Tokyo 2019
New Relic University at Future Stack Tokyo 2019New Relic University at Future Stack Tokyo 2019
New Relic University at Future Stack Tokyo 2019
 
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
 
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
FutureStack  Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...FutureStack  Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
 
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖をFutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
 
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
 
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
 
Three Monitoring Mistakes and How to Avoid Them
Three Monitoring Mistakes and How to Avoid ThemThree Monitoring Mistakes and How to Avoid Them
Three Monitoring Mistakes and How to Avoid Them
 
Intro to Multidimensional Kubernetes Monitoring
Intro to Multidimensional Kubernetes MonitoringIntro to Multidimensional Kubernetes Monitoring
Intro to Multidimensional Kubernetes Monitoring
 
FS18 Chicago Keynote
FS18 Chicago Keynote FS18 Chicago Keynote
FS18 Chicago Keynote
 
SRE-iously
SRE-iouslySRE-iously
SRE-iously
 
10 Things You Can Do With New Relic - Number 9 Will Shock You
10 Things You Can Do With New Relic - Number 9 Will Shock You10 Things You Can Do With New Relic - Number 9 Will Shock You
10 Things You Can Do With New Relic - Number 9 Will Shock You
 
Ground Rules for Code Reviews
Ground Rules for Code ReviewsGround Rules for Code Reviews
Ground Rules for Code Reviews
 
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
 
Monitor all your Kubernetes and EKS stack with New Relic
Monitor all your Kubernetes and EKS stack with New Relic	Monitor all your Kubernetes and EKS stack with New Relic
Monitor all your Kubernetes and EKS stack with New Relic
 
Host for the Most: Cloud Cost Optimization
Host for the Most: Cloud Cost OptimizationHost for the Most: Cloud Cost Optimization
Host for the Most: Cloud Cost Optimization
 
New Relic Infrastructure in the Real World: AWS
New Relic Infrastructure in the Real World: AWSNew Relic Infrastructure in the Real World: AWS
New Relic Infrastructure in the Real World: AWS
 
Best Practices for Measuring your Code Pipeline
Best Practices for Measuring your Code PipelineBest Practices for Measuring your Code Pipeline
Best Practices for Measuring your Code Pipeline
 
Top Three Mistakes People Make with Monitoring
Top Three Mistakes People Make with MonitoringTop Three Mistakes People Make with Monitoring
Top Three Mistakes People Make with Monitoring
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

FUTURESTACK13: AppSec in a DevOps World from Shaun Gordon, Director of Information Security & Compliance at New Relic

  • 1. AppSec in a DevOps World SHAUN GORDON NEW RELIC DIRECTOR OF INFORMATION SECURITY & COMPLIANCE OCTOBER 23, 2013 Wednesday, November 6, 13
  • 8. Accelerating Development Cycles Boxed Software Waterfall 1 Year Wednesday, November 6, 13
  • 9. Accelerating Development Cycles Web 1.0 3 months Waterfall Wednesday, November 6, 13
  • 10. Accelerating Development Cycles 4 week Wednesday, November 6, 13 Web 2.0 Agile
  • 11. Accelerating Development Cycles 2x week DevOps Wednesday, November 6, 13
  • 13. Accelerating Development Cycles hourly Wednesday, November 6, 13 Continuous Deployment DevOps
  • 14. Accelerating Development Cycles hourly Wednesday, November 6, 13 Continuous Deployment DevOps
  • 15. Accelerating Development Cycles 3 months Waterfall Agile 4 week Wednesday, November 6, 13
  • 16. Accelerating Development Cycles 3 months Waterfall Agile 4 week Wednesday, November 6, 13
  • 17. Accelerating Development Cycles daily hourly Wednesday, November 6, 13 Continuous Deployment DevOps
  • 18. Traditional (Waterfall) SDLC Requirements Wednesday, November 6, 13 Design Development Tes2ng Release Produc2on
  • 19. Traditional (Waterfall) SDLC Requirements Design Development Tes2ng Release Define functional (features) and nonfunctional requirements (capabilities) Wednesday, November 6, 13 Produc2on
  • 20. Traditional (Waterfall) SDLC Requirements Design Development Tes2ng Release Translate requirements into architecture and detailed design Wednesday, November 6, 13 Produc2on
  • 21. Traditional (Waterfall) SDLC Requirements Design Development Tes2ng Build it! Wednesday, November 6, 13 Release Produc2on
  • 22. Traditional (Waterfall) SDLC Requirements Design Development Tes2ng Release Produc2on Ensure functional and non-functional requirements Wednesday, November 6, 13
  • 23. Traditional (Waterfall) SDLC Requirements Design Development Tes2ng Ship or push live Wednesday, November 6, 13 Release Produc2on
  • 24. Traditional (Waterfall) SDLC Requirements Design Development Tes2ng Release Maintain and patch as needed Wednesday, November 6, 13 Produc2on
  • 25. Traditional (Waterfall) SDLC Security Wednesday, November 6, 13
  • 26. Checkpoints Controls Formal Processes Traditional (Waterfall) SDLC Security Wednesday, November 6, 13
  • 27. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 28. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 29. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 30. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 31. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 32. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 33. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 34. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 35. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 36. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 37. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 38. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 39. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 40. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 41. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Wednesday, November 6, 13 Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff Production • • Vulnerability Scanning Penetration Testing
  • 42. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • • Separation Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • • Vulnerability Scanning Penetration Testing
  • 43. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • • Separation Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • • Vulnerability Scanning Penetration Testing
  • 44. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Design • • Architectural Review Threat Modeling Development • • • Secure Coding Practices Static Analysis White Box Testing Testing • • • Separation Dynamic Analysis Requirements Testing Release • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • • Vulnerability Scanning Penetration Testing
  • 46. Continuous Deployment Security Requirements Low to No friction (can’t slow us down) Transparent No significant changes to development processes Make us More Secure Wednesday, November 6, 13
  • 47. Continuous Deployment Security Requirements Strategies & Tactics Low to No friction (can’t slow us down) Automation Transparent Training & Empowerment No significant changes to development processes Lightweight Processes Make us More Secure Triage Quickly Detect & Respond Wednesday, November 6, 13
  • 48. Traditional (Waterfall) SDLC Security Requirements • Functional & Non-Functional security requirement Design • Architectural • Review Threat Modeling Development • Secure Coding • • Practices Static Analysis White Box Testing Testing • Dynamic • • Separation Analysis Requirements Testing Release • Penetration • • Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • Vulnerability • Scanning Penetration Testing
  • 49. Continuous Deployment Security Requirements • Functional & Non-Functional security requirement Design • Architectural • Review Threat Modeling Development • Secure Coding • • Practices Static Analysis White Box Testing Testing • Dynamic • • Separation Analysis Requirements Testing Release • Penetration • • Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • Vulnerability • Scanning Penetration Testing
  • 50. Continuous Deployment Security Requirements • Functional & Non-Functional security requirement Design • Architectural • Review Threat Modeling Development • Secure Coding • • Practices Static Analysis White Box Testing Testing • Dynamic • • Separation Analysis Requirements Testing Release • Penetration • • Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • Vulnerability • Scanning Penetration Testing
  • 51. Continuous Deployment Security Requirements Design Requirements & Design • Functional & Non-Functional security requirement • Architectural • Review Threat Modeling Development Development, Testing & Release Release Testing, • Secure Coding • • Practices Static Analysis White Box Testing • Dynamic • • Separation Analysis Requirements Testing • Penetration • • Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production • Vulnerability • Scanning Penetration Testing
  • 52. Continuous Deployment Security Requirements & Design • Functional & Non-Functional security requirement • • Architectural Review Threat Modeling • • • Secure Coding Practices Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 53. Continuous Deployment Security Requirements & Design • Functional & Non-Functional security requirement • • Architectural Review Threat Modeling • • • Secure Coding Practices Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 54. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Threat Modeling • • • Secure Coding Practices Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 55. Required Security Evaluation < 25 Minute Meeting 1.Technical Overview 2.Business Context 3.Developer Concerns Wednesday, November 6, 13
  • 57. Security Evaluation Outcomes • Low Risk • Simple Guidance Wednesday, November 6, 13
  • 58. Security Evaluation Outcomes • Higher Risk • Deep Dive • Whiteboarding • Threat Model Wednesday, November 6, 13
  • 60. Security Evaluation Follow-Up • Document • Follow Up Wednesday, November 6, 13
  • 61. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Threat Modeling • • • Secure Coding Practices Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 62. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • Secure Coding Practices Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 64. Threat Modeling Identify your assets and the threats against them Wednesday, November 6, 13
  • 65. Threat Modeling Identify your assets and the threats against them Focus your resources on the greatest risks Wednesday, November 6, 13
  • 66. Threat Modeling @ New Relic Wednesday, November 6, 13
  • 67. Threat Modeling @ New Relic Decompose your Application Wednesday, November 6, 13
  • 68. Threat Modeling @ New Relic Decompose your Application Identify your Assets Wednesday, November 6, 13
  • 69. Threat Modeling @ New Relic Decompose your Application Identify your Assets Enumerate your Threats Wednesday, November 6, 13
  • 70. Threat Modeling @ New Relic Decompose your Application Identify your Assets Enumerate your Threats Rate & Rank your Threats Wednesday, November 6, 13
  • 71. Threat Modeling @ New Relic Decompose your Application Identify your Assets Enumerate your Threats Rate & Rank your Threats Address or Accept Wednesday, November 6, 13
  • 72. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • Secure Coding Practices Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 73. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 74. Secure Libraries & Services Authentication Service Security Event Logging Service Input Validation Regex Patterns Encryption Libraries Wednesday, November 6, 13
  • 75. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 76. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 78. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis White Box Testing • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 79. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 80. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 81. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • • • Separation Dynamic Analysis Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • • Vulnerability Scanning Penetration Testing
  • 82. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • • Separation Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • Penetration Testing
  • 83. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • • Separation Requirements Testing • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • Penetration Testing
  • 84. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • Penetration Testing
  • 85. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Penetration Testing Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release • Penetration Testing
  • 86. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 87. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Security Assessment Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 88. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Automated Commit Triage Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 89. Triage Process Dangerous Methods Sensitive Modules Security Keywords Wednesday, November 6, 13
  • 90. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Automated Commit Triage Security SignOff of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 91. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Automated Commit Triage Quick Detection & Recovery of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 92. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Separation • • • Automated Commit Triage Quick Detection & Recovery of Duties • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 93. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • • • Automated Commit Triage Quick Detection & Recovery • Accountability • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 94. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • • • Automated Commit Triage Quick Detection & Recovery • Accountability • Management Release Sign-Off • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 95. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • • • Automated Commit Triage Quick Detection & Recovery • Accountability • Sidekick Process • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 99. Two Sets of (masked) eyes on every change Wednesday, November 6, 13
  • 100. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • • • Automated Commit Triage Quick Detection & Recovery • Accountability • Sidekick Process • Limits on Production Access Wednesday, November 6, 13 Production Development, Testing, & Release Penetration Testing
  • 101. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Accountability • Sidekick Process • Enabling Tools Wednesday, November 6, 13 Production Development, Testing, & Release • • • Automated Commit Triage Quick Detection & Recovery Penetration Testing
  • 102. Continuous Deployment Security Requirements & Design • Required Security Evaluation • Lightweight Targeted Threat Modeling • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Accountability • Sidekick Process • Enabling Tools Wednesday, November 6, 13 Production Development, Testing, & Release • • • Automated Commit Triage Quick Detection & Recovery Penetration Testing
  • 103. Continuous Deployment Security Requirements & Design • • Required Security Evaluation Lightweight Targeted Threat Modeling Development, Testing, & Release • • • • Secure Coding Practices Security Libraries & Services Automated Static Analysis Testing Tools & Training • Continuous Scanning in Test, Staging, & Production • Automated • Penetration Commit Triage Testing Quick Detection • & Recovery • Accountability • Sidekick Process • Enabling Tools Wednesday, November 6, 13 Production
  • 105. Powered By... Automation Training & Empowerment Lightweight Processes Triage Quick Detection & Response Wednesday, November 6, 13
  • 108. Auditors Compensating Controls Tell the Story Wednesday, November 6, 13
  • 111. Image Attribution Slide  14 Checkpoint  Rheinpark  by   h1p://www.flickr.com/photos/kecko/3179561892/ Wednesday, November 6, 13