SlideShare a Scribd company logo
Innovating Faster with
Continuous Application Security
By Jeff Williams, CTO and co-founder Contrast Security
@planetlevel
The Average
application is
extremely
vulnerable
71%unused Libraries
26.7Vulnerabilities
2Vulnerabilities
8%USED Libraries
21%Custom Code
DevSecCon Boston 2018: Building a Practical DevSecOps Pipeline for Free 3
You are
Under
AttacK
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Traditional AppSec Doesn’t Scale
Experts
Expert
Tools
Application
Portfolio
Assurance
Coverage
Process Fit
Awful
Results
$$$$
Traditional AppSec
Program
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
DevSecOps Is Very Promising
5
https://itrevolution.com/the-three-ways-principles-underpinning-devops/
1.Establish work flow
2.Ensure instant feedback
3.Culture of experimentation
1.Establish security work flow
2.Ensure instant security feedback
3.Build a security culture
DEVOPS DEVSECOPS
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Continuous Application Security
Security in development Security in integration Security in operations
PROTECT
• Tell me who is attacking and how
• Stop vulns from being exploited
• Don’t create alert fatigue
ASSURE
• Don’t slow down my builds
• Integrate with my testing tools
• Real vulns break my build
EMPOWER
•Test my custom code and libraries
•Realtime feedback through my tools
•Don’t slow me down
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
IAST and RASP
Runtime Application
Self-Protection (RASP)
•Prevents exploit ofvulnerabilities
in both custom code and libraries.
Your Application or API
Config
Sensors
Code
Sensors
Control Flow
Sensors
HTTP
Sensors
Backend
Sensors
Data Flow
Sensors
Library
Sensors
Exploit
Prevented
Vulnerability
Confirmed
✘
Interactive Application
Security Testing (IAST)
•Detects vulnerabilities in both
custom code and libraries
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
A Fully Automated Pipeline with Security
Development CI/CD/QA Operations
IAST IAST/RASP RASP
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Adding IAST/RASP to PCF application
9
cf login
cf push spring-petclinic
cf create-user-provided-service contrast-security-service
-p "teamserver_url, username, api_key, service_key”
cf bind-service spring-petclinic contrast-security-service
cf restage spring-petclinic
10
• Must be extremely accurate
• Must work on modern apps with APIs and OSS
Test my custom code AND libraries
• Must integrate with tools I’m already using – NO PDF!
Realtime feedback through my tools
• Must not create bottleneck – NO SCANNING!
Don’t slow me down
Security in
Development
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Automation is all about speed, accuracy, and ease-of-use
11
OWASP
Benchmark
Free and open
application
benchmark with
thousands of
security test cases
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Download an IAST/RASP Agent
12
1. Download 2. Install 3. Enjoy
agent
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Empower developers to assess their own security!
13
PRODDEV CI/CD
APIs Containers
PrivateCloud
APIs ContainersPrivate
Public Cloud
Custom Code
- and -
Open Source
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Security in Everyday environment
14
IDE ChatOps Browser
Others:
15
• Fully automated security testing with every build
Don’t slow down my builds
• Plugins, integrations, webhooks, and FULL REST API
Integrate with my testing tools
• Set criteria for when to break the build
Break my build… but only for real issues
Security In
Integration
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Fail the build
16
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Automatic Bugtracking Integration
17
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Measuring Attack Surface
18
Jumpstarting Your DevSecOps Pipeline with IAST and RASP | @planetlevel 19
Measuring
Security Testing
Coverage
20
• I need actionable threat intelligence
Tell me who is attacking and how
• Must not overblock (FP) or underblock (FN)
Stop vulnerabilities from being exploited
• Don’t warn me about meaningless probes
Don’t create alert fatigue
Security in
operations
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Protect Applications and APIs with RASP
21
Custom Code
Open Source
Libraries and
Frameworks
Application Server
and Platform
• PREVENTS Known
Vulnerabilities from exploit
• Prevents LATENT
Vulnerabilities from exploit
• Fast response to prevent
NOVEL vulnerabilities from
exploit
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
RASP Deploys with Your Application
22
• Ansible
• Puppet
• Docker
• Kubernetes
• Whatever…
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
RASP Protects Against OSS Vulnerabilities
23
March 7
CVE-2017-5638
Disclosed, Apache
releases fixed version
March 8
We observe
widespread
attacks
Mid-May
Equifax
breach
occurs
July29
Equifax
learns of
breach
Sept 7
Equifax discloses,
Four more Struts2
CVEs disclosed
No updates
You must have
infrastructure to respond
within hours.
DisasterNo detection
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
RASP Supports Complex and Backend Protocols
24
Application
Untrusted deserialization Name:
Smith, James
Record ID:
123456
Owner:
Finance
Application expects to
receive this object
Bad Guy
AcmeInternalType#cmd:
java.lang.Runtime
AcmeInternalType#mtd:
getRuntime().exec
AcmeInternalType#args:
‘cmd.exe’,’/C’,’calc’
AcmeInternalType#cmd:
java.lang.Runtime
AcmeInternalType#mtd:
getRuntime().exec
AcmeInternalType#args:
‘cmd.exe’,’/C’,’calc’
Attacker sends malicious object
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
RASP Is Fast
25
+50 µs 100x faster than wafRASP
waf +5 ms
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
RASP Provides AppSec Threat Intelligence
26
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Continuous Application Security
Security in development Security in integration Security in operations
PROTECT
• Tell me who is attacking and how
• Stop vulns from being exploited
• Don’t create alert fatigue
ASSURE
• Don’t slow down my builds
• Integrate with my testing tools
• Real vulns break my build
EMPOWER
•Test my custom code and libraries
•Realtime feedback through my tools
•Don’t slow me down
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Fully Continuous AppSec
Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons
Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Contrast Community Edition
21,000,000 DEVELOPERS
IN THE WORLD AND
ONLY 6% HAVE ACCESS TO
DECENT SECURITY TOOLS
Contrast CE is a totally free and full-strength application
security platform combining:
• Assess web apps and APIs for vulnerabilities (AST)
• Monitor open source (SCA)
• Runtime exploit prevention (RASP)
Faster, more accurate, more scalable, better integrated,
and more DevSecOps-friendly than any other application
security solution.
Coming Soon:
https://www.contrastsecurity.com/contrast-community-edition
> Go Fast and Be Secure.
Try Continuous Application Security Now!
#springone@s1p

More Related Content

What's hot (20)

PDF
Lessons from a recovering runtime application self protection addict
Priyanka Aash
 
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
PPT
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Phil Agcaoili
 
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Digital Defense Inc
 
PDF
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Sonatype
 
PPTX
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
 
PPT
IBM Rational AppScan Product Overview
Ashish Patel
 
PDF
A Successful SAST Tool Implementation
Checkmarx
 
PPTX
Making Security Agile
Oleg Gryb
 
PPTX
The path of secure software by Katy Anton
DevSecCon
 
PPT
IBM AppScan Standard - The Web Application Security Solution
hearme limited company
 
PPTX
Introduction to DevSecOps
abhimanyubhogwan
 
PDF
Securing a Cloud Migration
Carlos Andrés García
 
PPTX
Security as a new metric for Business, Product and Development Lifecycle
Nazar Tymoshyk, CEH, Ph.D.
 
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
PDF
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
Sonatype
 
PPTX
Agile and Secure Development
Nazar Tymoshyk, CEH, Ph.D.
 
PPTX
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
PPTX
7 Reasons Your Applications are Attractive to Adversaries
Derek E. Weeks
 
PPT
IBM AppScan Enterprise - The total software security solution
hearme limited company
 
Lessons from a recovering runtime application self protection addict
Priyanka Aash
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Phil Agcaoili
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Digital Defense Inc
 
Understanding & Addressing OWASP’s Newest Top Ten Threat: Using Components wi...
Sonatype
 
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Derrick Hunter
 
IBM Rational AppScan Product Overview
Ashish Patel
 
A Successful SAST Tool Implementation
Checkmarx
 
Making Security Agile
Oleg Gryb
 
The path of secure software by Katy Anton
DevSecCon
 
IBM AppScan Standard - The Web Application Security Solution
hearme limited company
 
Introduction to DevSecOps
abhimanyubhogwan
 
Securing a Cloud Migration
Carlos Andrés García
 
Security as a new metric for Business, Product and Development Lifecycle
Nazar Tymoshyk, CEH, Ph.D.
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
Sonatype
 
Agile and Secure Development
Nazar Tymoshyk, CEH, Ph.D.
 
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
7 Reasons Your Applications are Attractive to Adversaries
Derek E. Weeks
 
IBM AppScan Enterprise - The total software security solution
hearme limited company
 

Similar to Innovating Faster with Continuous Application Security (20)

PDF
Developer Secure Containers for the Cyberspace Battlefield
VMware Tanzu
 
PDF
What's new in Reactor Californium
Stéphane Maldini
 
PDF
Heavyweights: Tipping the Scales with Very Large Foundations
VMware Tanzu
 
PDF
Marcin Grzejszczak - Contract Tests in the Enterprise
SegFaultConf
 
PPTX
12 Factor, or Cloud Native Apps – What EXACTLY Does that Mean for Spring Deve...
cornelia davis
 
PDF
Cross-Platform Observability for Cloud Foundry
VMware Tanzu
 
PDF
riffing on Knative - Scott Andrews
VMware Tanzu
 
PDF
P to V to C: The Value of Bringing “Everything” to Containers
VMware Tanzu
 
PPTX
Buckets, Funnels, Mobs and Cats or: How We Learned to Love Scaling Apps To Th...
VMware Tanzu
 
PPTX
Experience + Education = Empowerment
VMware Tanzu
 
PDF
Spring Cloud Gateway - Ryan Baxter
VMware Tanzu
 
PPTX
Serverless Spring 오충현
VMware Tanzu Korea
 
PPTX
Chaos Engineering for PCF
VMware Tanzu
 
PDF
Automation and Culture Changes for 40M Subscriber Platform Operation
VMware Tanzu
 
PPTX
Tools to Slay the Fire Breathing Monoliths in Your Enterprise
VMware Tanzu
 
PDF
Containers Were Never Your End State
VMware Tanzu
 
PDF
SDLC for Pivotal Platform powered by Spring Initializr and Concourse
VMware Tanzu
 
PDF
Introduction to Reactive Streams and Reactor 2.5
Stéphane Maldini
 
PPTX
The Cloud Challenge
VMware Tanzu
 
PDF
SpringOnePlatform2017 recap
minseok kim
 
Developer Secure Containers for the Cyberspace Battlefield
VMware Tanzu
 
What's new in Reactor Californium
Stéphane Maldini
 
Heavyweights: Tipping the Scales with Very Large Foundations
VMware Tanzu
 
Marcin Grzejszczak - Contract Tests in the Enterprise
SegFaultConf
 
12 Factor, or Cloud Native Apps – What EXACTLY Does that Mean for Spring Deve...
cornelia davis
 
Cross-Platform Observability for Cloud Foundry
VMware Tanzu
 
riffing on Knative - Scott Andrews
VMware Tanzu
 
P to V to C: The Value of Bringing “Everything” to Containers
VMware Tanzu
 
Buckets, Funnels, Mobs and Cats or: How We Learned to Love Scaling Apps To Th...
VMware Tanzu
 
Experience + Education = Empowerment
VMware Tanzu
 
Spring Cloud Gateway - Ryan Baxter
VMware Tanzu
 
Serverless Spring 오충현
VMware Tanzu Korea
 
Chaos Engineering for PCF
VMware Tanzu
 
Automation and Culture Changes for 40M Subscriber Platform Operation
VMware Tanzu
 
Tools to Slay the Fire Breathing Monoliths in Your Enterprise
VMware Tanzu
 
Containers Were Never Your End State
VMware Tanzu
 
SDLC for Pivotal Platform powered by Spring Initializr and Concourse
VMware Tanzu
 
Introduction to Reactive Streams and Reactor 2.5
Stéphane Maldini
 
The Cloud Challenge
VMware Tanzu
 
SpringOnePlatform2017 recap
minseok kim
 
Ad

Recently uploaded (20)

PDF
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
PPTX
Transforming Mining & Engineering Operations with Odoo ERP | Streamline Proje...
SatishKumar2651
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PDF
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PPTX
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PDF
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
PDF
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
PPTX
Tally software_Introduction_Presentation
AditiBansal54083
 
PDF
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
PDF
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
Transforming Mining & Engineering Operations with Odoo ERP | Streamline Proje...
SatishKumar2651
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
Open Chain Q2 Steering Committee Meeting - 2025-06-25
Shane Coughlan
 
Tally software_Introduction_Presentation
AditiBansal54083
 
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
Ad

Innovating Faster with Continuous Application Security

  • 1. Innovating Faster with Continuous Application Security By Jeff Williams, CTO and co-founder Contrast Security @planetlevel
  • 2. The Average application is extremely vulnerable 71%unused Libraries 26.7Vulnerabilities 2Vulnerabilities 8%USED Libraries 21%Custom Code
  • 3. DevSecCon Boston 2018: Building a Practical DevSecOps Pipeline for Free 3 You are Under AttacK
  • 4. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Traditional AppSec Doesn’t Scale Experts Expert Tools Application Portfolio Assurance Coverage Process Fit Awful Results $$$$ Traditional AppSec Program
  • 5. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ DevSecOps Is Very Promising 5 https://itrevolution.com/the-three-ways-principles-underpinning-devops/ 1.Establish work flow 2.Ensure instant feedback 3.Culture of experimentation 1.Establish security work flow 2.Ensure instant security feedback 3.Build a security culture DEVOPS DEVSECOPS
  • 6. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Continuous Application Security Security in development Security in integration Security in operations PROTECT • Tell me who is attacking and how • Stop vulns from being exploited • Don’t create alert fatigue ASSURE • Don’t slow down my builds • Integrate with my testing tools • Real vulns break my build EMPOWER •Test my custom code and libraries •Realtime feedback through my tools •Don’t slow me down
  • 7. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ IAST and RASP Runtime Application Self-Protection (RASP) •Prevents exploit ofvulnerabilities in both custom code and libraries. Your Application or API Config Sensors Code Sensors Control Flow Sensors HTTP Sensors Backend Sensors Data Flow Sensors Library Sensors Exploit Prevented Vulnerability Confirmed ✘ Interactive Application Security Testing (IAST) •Detects vulnerabilities in both custom code and libraries
  • 8. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ A Fully Automated Pipeline with Security Development CI/CD/QA Operations IAST IAST/RASP RASP
  • 9. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Adding IAST/RASP to PCF application 9 cf login cf push spring-petclinic cf create-user-provided-service contrast-security-service -p "teamserver_url, username, api_key, service_key” cf bind-service spring-petclinic contrast-security-service cf restage spring-petclinic
  • 10. 10 • Must be extremely accurate • Must work on modern apps with APIs and OSS Test my custom code AND libraries • Must integrate with tools I’m already using – NO PDF! Realtime feedback through my tools • Must not create bottleneck – NO SCANNING! Don’t slow me down Security in Development
  • 11. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Automation is all about speed, accuracy, and ease-of-use 11 OWASP Benchmark Free and open application benchmark with thousands of security test cases
  • 12. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Download an IAST/RASP Agent 12 1. Download 2. Install 3. Enjoy agent
  • 13. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Empower developers to assess their own security! 13 PRODDEV CI/CD APIs Containers PrivateCloud APIs ContainersPrivate Public Cloud Custom Code - and - Open Source
  • 14. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Security in Everyday environment 14 IDE ChatOps Browser Others:
  • 15. 15 • Fully automated security testing with every build Don’t slow down my builds • Plugins, integrations, webhooks, and FULL REST API Integrate with my testing tools • Set criteria for when to break the build Break my build… but only for real issues Security In Integration
  • 16. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Fail the build 16
  • 17. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Automatic Bugtracking Integration 17
  • 18. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Measuring Attack Surface 18
  • 19. Jumpstarting Your DevSecOps Pipeline with IAST and RASP | @planetlevel 19 Measuring Security Testing Coverage
  • 20. 20 • I need actionable threat intelligence Tell me who is attacking and how • Must not overblock (FP) or underblock (FN) Stop vulnerabilities from being exploited • Don’t warn me about meaningless probes Don’t create alert fatigue Security in operations
  • 21. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Protect Applications and APIs with RASP 21 Custom Code Open Source Libraries and Frameworks Application Server and Platform • PREVENTS Known Vulnerabilities from exploit • Prevents LATENT Vulnerabilities from exploit • Fast response to prevent NOVEL vulnerabilities from exploit
  • 22. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ RASP Deploys with Your Application 22 • Ansible • Puppet • Docker • Kubernetes • Whatever…
  • 23. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ RASP Protects Against OSS Vulnerabilities 23 March 7 CVE-2017-5638 Disclosed, Apache releases fixed version March 8 We observe widespread attacks Mid-May Equifax breach occurs July29 Equifax learns of breach Sept 7 Equifax discloses, Four more Struts2 CVEs disclosed No updates You must have infrastructure to respond within hours. DisasterNo detection
  • 24. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ RASP Supports Complex and Backend Protocols 24 Application Untrusted deserialization Name: Smith, James Record ID: 123456 Owner: Finance Application expects to receive this object Bad Guy AcmeInternalType#cmd: java.lang.Runtime AcmeInternalType#mtd: getRuntime().exec AcmeInternalType#args: ‘cmd.exe’,’/C’,’calc’ AcmeInternalType#cmd: java.lang.Runtime AcmeInternalType#mtd: getRuntime().exec AcmeInternalType#args: ‘cmd.exe’,’/C’,’calc’ Attacker sends malicious object
  • 25. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ RASP Is Fast 25 +50 µs 100x faster than wafRASP waf +5 ms
  • 26. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ RASP Provides AppSec Threat Intelligence 26
  • 27. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Continuous Application Security Security in development Security in integration Security in operations PROTECT • Tell me who is attacking and how • Stop vulns from being exploited • Don’t create alert fatigue ASSURE • Don’t slow down my builds • Integrate with my testing tools • Real vulns break my build EMPOWER •Test my custom code and libraries •Realtime feedback through my tools •Don’t slow me down
  • 28. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Fully Continuous AppSec
  • 29. Unless otherwise indicated, these slides are © 2013-2018 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Contrast Community Edition 21,000,000 DEVELOPERS IN THE WORLD AND ONLY 6% HAVE ACCESS TO DECENT SECURITY TOOLS Contrast CE is a totally free and full-strength application security platform combining: • Assess web apps and APIs for vulnerabilities (AST) • Monitor open source (SCA) • Runtime exploit prevention (RASP) Faster, more accurate, more scalable, better integrated, and more DevSecOps-friendly than any other application security solution. Coming Soon: https://www.contrastsecurity.com/contrast-community-edition
  • 30. > Go Fast and Be Secure. Try Continuous Application Security Now! #springone@s1p