SlideShare une entreprise Scribd logo
1  sur  14
Can you really automate yourself secure?
Facts vs. Fantasies
Scott Crawford, Research Director, 451 Research
Nabil Hannan, Managing Principal, Security, Cigital
Security teams are struggling
• “Lack of staff expertise” the most
common obstacle to multiple
aspects of security ops
• “Organizational politics/Lack of
attention” the second most reported
infosec pain point1
• More data than teams can handle
• SIEM: Events per second into the 5-
digit range
• One-fourth of security orgs still can’t
understand and baseline normal
behavior2
DAST/SAST inhibitors: What inhibitors has your
organization encountered in adopting or fully utilizing
your vendor’s technology?
1 451 Research, Voice of the Enterprise: Information Security, Q3
2015
2 SANS Institute 2015 Analytics and Intelligence Survey
Source: 451 Research, Voice of
the Enterprise: Information
Security, Q3 2015
Automation can help with these burdens
• Continued growth in use of security
analytics
• Assessment and testing as well as
operational monitoring and
control
• Applications of machine learning
• Ability to handle data at speed
and scale
• Advantages of the cloud
• Rise of security task automation
• Today:
• “Playbook” approach to orchestration
• Auto-generation of code (.py)
• Incident response workflow & data
aggregation
• Testing and assessment
• Tomorrow:
• Containers and microservices
• “Infrastructure-as-code”
What CAN’T automation do?
What CAN’T automation do?
First of all, what’s your strategy?
• Case in point: Application security covers a lot
of ground
• Static, Dynamic, Interactive testing?
• IDE-integrated real-time code analysis/guidance?
• Source supply chain? Runtime protection?
• What do you hope to achieve with
automation?
• Who will be responsible? Developers? Operations
teams? Security experts?
• Limited requirements for test data and automated test suites? Developers
implementing more secure code?
• Limited requirements for modifying the production environment?
• Automation without a plan and a strategy runs the risk of
automating the wrong things
Goal Setting
The reality of automation tools
• They are designed to address “likely” use
cases out of the box
• BUT…Every application is different
• Specific implementations require one (or
both) of two things:
• Adaptation of the technology to the
environment (tool tuning)
• Adaptation of the environment to the tool (assuring that tools have access to
all relevant functionality in the target application)
• Who or what makes this happen?
• Do you know what the cost in time and expertise will be to make sure
your automation tools deliver expected results?
Adapting to application differences
Automation has its limits
• Do you know how far automation can go in your
case?
• Application security coverage:
• How much direction do your tools require?
• Do they follow all the logic and branches you
expect? What are the tradeoffs if they do?
• Caveat: Be aware when benchmarks may mask these factors!
• Those that favor techniques such as IAST by scripting the assessment of all inputs, vs.
SAST or DAST tools which must drive their own coverage
• Scope/scale of test cases: How many does each type of benchmark evaluate? Are you
measuring a sprint against a marathon?
• Do the limits of your tools fit your expectations? Do you know how to
manage the gaps if they don’t?
Automation has its own information overload risks
• False positives aren’t the only issue. Say:
• A given run of your tool finds 500 possible issues
• With a true positive rate of 20% (so 100 out of those
500 reported issues are actually legit)
• …but your team only has time to evaluate 200 of the
500 findings
• If that 20% of true positives is evenly distributed,
your team will ID only 40 TP’s out of the 200
possibilities they examine (200 x 20% = 40)
• ...Meaning that your team will miss the
remaining 60 true positives found
• Does your team really have the
resources to fully assess the results of
automation without missing important
findings?
All
findings
The
findings
our
team
can get
to
All true
positives
The
TPs
our
team
found
The TPs
our team
missed
Where will automation fit into your processes?
• Traditional application security testing:
• Periodic
• DAST may be “monolithic” – run against an
entire application or large/comprehensive
components
• In a DevOps environment:
• Frequent updates, releases – moving toward
CI/CD
• Testing may need to be closer to continuous
• Broken into smaller chunks – more “unit”
oriented than monolithic
• Are your teams ready for the impact of
integrating secure development and
testing into DevOps?
How well do your security pros
understand the DevOps toolchain?
How well do your developers & ops
teams understand security needs?
Congratulations, you have results! …Now what?
• Don’t forget: Discovery is only half
the battle!
• Once your automation tools reveal
exposures, will you be able to close
them successfully?
• Security task automation can close
operational exposures…
• ...but can they remediate
vulnerabilities or implementations in
the applications themselves?
• If your automated testing tools
produce results, what’s your
strategy for closing the loop on
remediation?
Automation solves a lot of problems…but
• Only people can:
• Understand your business and security
goals and objectives
• Know the limits of automation tools…and
how and where to close their gaps
• Invest the effort required to assess the
results of automation and apply it correctly
• Integrate security automation into
development and operational practices
• Assure that remediation answers the security needs revealed by the
automation of monitoring and assessment
• Help you develop the right automation strategy based on
experience
Solutions for the full SDLC

Contenu connexe

Tendances

BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityCigital
 
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018Imola Informatica
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsSeniorStoryteller
 
OWASP Top 10 practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav BreslavskyiOWASP Top 10 practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav BreslavskyiNazar Tymoshyk, CEH, Ph.D.
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...WhiteSource
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyJason Suttie
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cyclevulsec123
 
The State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource WebinarThe State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource WebinarWhiteSource
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturitySynopsys Software Integrity Group
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementBlack Duck by Synopsys
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource
 
Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2matthewabq
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 

Tendances (20)

BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018Secure Software Development Lifecycle - Devoxx MA 2018
Secure Software Development Lifecycle - Devoxx MA 2018
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOps
 
The R.O.A.D to DevOps
The R.O.A.D to DevOpsThe R.O.A.D to DevOps
The R.O.A.D to DevOps
 
Session15
Session15Session15
Session15
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
OWASP Top 10 practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav BreslavskyiOWASP Top 10 practice workshop by Stanislav Breslavskyi
OWASP Top 10 practice workshop by Stanislav Breslavskyi
 
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour... The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
DEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journeyDEVSECOPS: Coding DevSecOps journey
DEVSECOPS: Coding DevSecOps journey
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
The State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource WebinarThe State of Open Source Vulnerabilities - A WhiteSource Webinar
The State of Open Source Vulnerabilities - A WhiteSource Webinar
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
 
The Case for Continuous Open Source Management
The Case for Continuous Open Source ManagementThe Case for Continuous Open Source Management
The Case for Continuous Open Source Management
 
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
 
Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2Stalled at the intersection of dev ops and security v2
Stalled at the intersection of dev ops and security v2
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 

En vedette

Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for YouCigital
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game SecurityCigital
 
7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMMCigital
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREADchuckbt
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingPriyanka Aash
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingPriyanka Aash
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleNCC Group
 
Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...
Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...
Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...Álvaro Miguel Carranza Montalvo
 
ChristieAmyotResume2015
ChristieAmyotResume2015ChristieAmyotResume2015
ChristieAmyotResume2015Christie Amyot
 
2 freshwater stingrays (potamotrygonidae)- status, conservation and manageme...
2  freshwater stingrays (potamotrygonidae)- status, conservation and manageme...2  freshwater stingrays (potamotrygonidae)- status, conservation and manageme...
2 freshwater stingrays (potamotrygonidae)- status, conservation and manageme...pryloock
 
Repechage prezentacja wersja 1
Repechage prezentacja wersja 1 Repechage prezentacja wersja 1
Repechage prezentacja wersja 1 barbararepechage
 
كتاب نهاية اسرائيل
كتاب نهاية اسرائيلكتاب نهاية اسرائيل
كتاب نهاية اسرائيلReda Elkholy
 
Asking for, and getting help for child neglect:children, young people and par...
Asking for, and getting help for child neglect:children, young people and par...Asking for, and getting help for child neglect:children, young people and par...
Asking for, and getting help for child neglect:children, young people and par...BASPCAN
 
Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...
Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...
Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...BASPCAN
 

En vedette (20)

Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Romania & Portugal
Romania & PortugalRomania & Portugal
Romania & Portugal
 
Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...
Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...
Evaluación de los Procesos de Educación Superior, Bolivia, Evaluación, Prospe...
 
Udacity
UdacityUdacity
Udacity
 
happy
happyhappy
happy
 
Eternal recurrence pp
Eternal recurrence ppEternal recurrence pp
Eternal recurrence pp
 
ChristieAmyotResume2015
ChristieAmyotResume2015ChristieAmyotResume2015
ChristieAmyotResume2015
 
2 freshwater stingrays (potamotrygonidae)- status, conservation and manageme...
2  freshwater stingrays (potamotrygonidae)- status, conservation and manageme...2  freshwater stingrays (potamotrygonidae)- status, conservation and manageme...
2 freshwater stingrays (potamotrygonidae)- status, conservation and manageme...
 
Repechage prezentacja wersja 1
Repechage prezentacja wersja 1 Repechage prezentacja wersja 1
Repechage prezentacja wersja 1
 
كتاب نهاية اسرائيل
كتاب نهاية اسرائيلكتاب نهاية اسرائيل
كتاب نهاية اسرائيل
 
Asking for, and getting help for child neglect:children, young people and par...
Asking for, and getting help for child neglect:children, young people and par...Asking for, and getting help for child neglect:children, young people and par...
Asking for, and getting help for child neglect:children, young people and par...
 
Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...
Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...
Extending the Reach of Child Sexual Exploitation Services: Reflections of Fam...
 

Similaire à Can You Really Automate Yourself Secure

Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Security Innovation
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)Andrew Case
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019Stefan Streichsbier
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...DevOps.com
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentortmbainjr131
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
How to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsHow to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsSecurity Innovation
 

Similaire à Can You Really Automate Yourself Secure (20)

Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019State of DevSecOps - DevOpsDays Jakarta 2019
State of DevSecOps - DevOpsDays Jakarta 2019
 
State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019State of DevSecOps - GTACS 2019
State of DevSecOps - GTACS 2019
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...Best Practices for Driving Software Quality through a Federated Application S...
Best Practices for Driving Software Quality through a Federated Application S...
 
Implementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentorImplementing AppSec Policies with TeamMentor
Implementing AppSec Policies with TeamMentor
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
How to Get the Most Out of Security Tools
How to Get the Most Out of Security ToolsHow to Get the Most Out of Security Tools
How to Get the Most Out of Security Tools
 

Plus de Cigital

Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security MetricsCigital
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCigital
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistCigital
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The NumbersCigital
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelCigital
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsCigital
 

Plus de Cigital (7)

Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The Numbers
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security Flaws
 

Dernier

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 

Dernier (20)

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 

Can You Really Automate Yourself Secure

  • 1. Can you really automate yourself secure? Facts vs. Fantasies Scott Crawford, Research Director, 451 Research Nabil Hannan, Managing Principal, Security, Cigital
  • 2. Security teams are struggling • “Lack of staff expertise” the most common obstacle to multiple aspects of security ops • “Organizational politics/Lack of attention” the second most reported infosec pain point1 • More data than teams can handle • SIEM: Events per second into the 5- digit range • One-fourth of security orgs still can’t understand and baseline normal behavior2 DAST/SAST inhibitors: What inhibitors has your organization encountered in adopting or fully utilizing your vendor’s technology? 1 451 Research, Voice of the Enterprise: Information Security, Q3 2015 2 SANS Institute 2015 Analytics and Intelligence Survey Source: 451 Research, Voice of the Enterprise: Information Security, Q3 2015
  • 3. Automation can help with these burdens • Continued growth in use of security analytics • Assessment and testing as well as operational monitoring and control • Applications of machine learning • Ability to handle data at speed and scale • Advantages of the cloud • Rise of security task automation • Today: • “Playbook” approach to orchestration • Auto-generation of code (.py) • Incident response workflow & data aggregation • Testing and assessment • Tomorrow: • Containers and microservices • “Infrastructure-as-code” What CAN’T automation do?
  • 5. First of all, what’s your strategy? • Case in point: Application security covers a lot of ground • Static, Dynamic, Interactive testing? • IDE-integrated real-time code analysis/guidance? • Source supply chain? Runtime protection? • What do you hope to achieve with automation? • Who will be responsible? Developers? Operations teams? Security experts? • Limited requirements for test data and automated test suites? Developers implementing more secure code? • Limited requirements for modifying the production environment? • Automation without a plan and a strategy runs the risk of automating the wrong things
  • 7. The reality of automation tools • They are designed to address “likely” use cases out of the box • BUT…Every application is different • Specific implementations require one (or both) of two things: • Adaptation of the technology to the environment (tool tuning) • Adaptation of the environment to the tool (assuring that tools have access to all relevant functionality in the target application) • Who or what makes this happen? • Do you know what the cost in time and expertise will be to make sure your automation tools deliver expected results?
  • 9. Automation has its limits • Do you know how far automation can go in your case? • Application security coverage: • How much direction do your tools require? • Do they follow all the logic and branches you expect? What are the tradeoffs if they do? • Caveat: Be aware when benchmarks may mask these factors! • Those that favor techniques such as IAST by scripting the assessment of all inputs, vs. SAST or DAST tools which must drive their own coverage • Scope/scale of test cases: How many does each type of benchmark evaluate? Are you measuring a sprint against a marathon? • Do the limits of your tools fit your expectations? Do you know how to manage the gaps if they don’t?
  • 10. Automation has its own information overload risks • False positives aren’t the only issue. Say: • A given run of your tool finds 500 possible issues • With a true positive rate of 20% (so 100 out of those 500 reported issues are actually legit) • …but your team only has time to evaluate 200 of the 500 findings • If that 20% of true positives is evenly distributed, your team will ID only 40 TP’s out of the 200 possibilities they examine (200 x 20% = 40) • ...Meaning that your team will miss the remaining 60 true positives found • Does your team really have the resources to fully assess the results of automation without missing important findings? All findings The findings our team can get to All true positives The TPs our team found The TPs our team missed
  • 11. Where will automation fit into your processes? • Traditional application security testing: • Periodic • DAST may be “monolithic” – run against an entire application or large/comprehensive components • In a DevOps environment: • Frequent updates, releases – moving toward CI/CD • Testing may need to be closer to continuous • Broken into smaller chunks – more “unit” oriented than monolithic • Are your teams ready for the impact of integrating secure development and testing into DevOps? How well do your security pros understand the DevOps toolchain? How well do your developers & ops teams understand security needs?
  • 12. Congratulations, you have results! …Now what? • Don’t forget: Discovery is only half the battle! • Once your automation tools reveal exposures, will you be able to close them successfully? • Security task automation can close operational exposures… • ...but can they remediate vulnerabilities or implementations in the applications themselves? • If your automated testing tools produce results, what’s your strategy for closing the loop on remediation?
  • 13. Automation solves a lot of problems…but • Only people can: • Understand your business and security goals and objectives • Know the limits of automation tools…and how and where to close their gaps • Invest the effort required to assess the results of automation and apply it correctly • Integrate security automation into development and operational practices • Assure that remediation answers the security needs revealed by the automation of monitoring and assessment • Help you develop the right automation strategy based on experience
  • 14. Solutions for the full SDLC

Notes de l'éditeur

  1. These questions will help determine how, when and where you plan to integrate security into your application development and operational plans, and the right tools to use…as well as where human expertise will be needed.
  2. And just as importantly: What are the best tools for the job? Does your team have the right expertise to assess this?
  3. For applications, until automated code generation can effectively close the most significant discovered vulnerabilities, human input will be required to assure remediation.