SlideShare a Scribd company logo
Managing
Application Config
and Secrets
HELLO!
I am Eng Teong Cheah
Microsoft MVP
You can find me at @walkercet
2
Introduction to Security
3
1
Introduction to Security
▰ Security is everyone’s responsibility and needs
to be looked at holistically across the
application life cycle.
4
SQL Injection Attack
SQL Injection (SQLi) is a type of an injection
attack that makes it possible to execute
malicious SQL statements.
5
6
2Implement Secure &
Compliant Development
Processes
Threat Modeling
▰ Define security requirements
▰ Create an application diagram
▰ Identify threats
▰ Mitigate threats
▰ Validate that threats have been mitigated
7
Key Validation Points
▰ Continuous security validation should be
added at each step from development through
production
8
Continuous Integration
▰ The CI build should be executed as part of the
pull request (PR-CI) process and once the
merge is complete
▰ Be sure to scan third party packages for
vulnerabilities and check OSS license usage
9
Infrastructure Vulnerabilities
▰ Be sure to validate the infrastructure
▰ Use the Azure Security Center and Azure
Policies
10
Application Deployment to DEV and TEST
▰ OWASP ZAP can be used for penetration
testing
▰ Testing can be active or passive
▰ Conduct a quick baseline scan to identify
vulnerabilities
▰ Conduct nightly more intensive scans
11
Results and Bugs
12
▰ OWASP ZAP provides a report with results and
bugs
▰ Use a holistic and layered approach to security
13
3
Rethinking Application
Config Data
Rethinking Application Config Data
14
▰
▰
▰
Separation of Concerns
15
▰
▰
▰
▰
External Configuration Store Patterns
16
▰
▰
Integrating Azure Key Vault with Azure Pipeline
17
▰
18
4
Manage Secrets, Tokens,
and Certificates
Manage Secrets, Tokens & Certificates
19
▰
▰
▰
▰
▰
Kubernetes and Azure Key Vault
20
▰
▰
▰
▰
21
5Implement Tools for
Managing Security and
Compliance
SonarCloud
22
▰
▰
Implement Continuous Security Validation
23
▰
24
THANKS!
Any questions?
You can find me at
@walkercet
CREDITS
▰ Microsoft Docs
25

More Related Content

What's hot (20)

PDF
Linux Security for Developers
Michael Boelen
 
PPTX
Practice of AppSec .NET
Mikhail Shcherbakov
 
PPTX
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
PDF
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
PPT
Implementing application security using the .net framework
Lalit Kale
 
PPTX
Wordpress security
jhon wilson
 
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
PPTX
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
PPTX
security misconfigurations
Megha Sahu
 
PPTX
Uniface Web Application Security
Uniface
 
KEY
mod_security introduction at study2study #3
Naoya Nakazawa
 
PDF
Application Security - Key Vault
Eng Teong Cheah
 
PDF
[OWASP Poland Day] Security knowledge framework
OWASP
 
PPTX
[OWASP Poland Day] Saving private token
OWASP
 
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
PPTX
Best Practices for Configuring Your OSSIM Installation
AlienVault
 
PDF
[OWASP Poland Day] OWASP for testing mobile applications
OWASP
 
PDF
Ten Tools for Security Professionals
McGrewSecurity
 
PPTX
Next-Gen Security Solution: Gateway Protection
Quick Heal Technologies Ltd.
 
PDF
Mod Security
Abhishek Singh
 
Linux Security for Developers
Michael Boelen
 
Practice of AppSec .NET
Mikhail Shcherbakov
 
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
Inherent Security Design Patterns for SDN/NFV Deployments
OPNFV
 
Implementing application security using the .net framework
Lalit Kale
 
Wordpress security
jhon wilson
 
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
12 Crucial Windows Security Skills for 2018
Paula Januszkiewicz
 
security misconfigurations
Megha Sahu
 
Uniface Web Application Security
Uniface
 
mod_security introduction at study2study #3
Naoya Nakazawa
 
Application Security - Key Vault
Eng Teong Cheah
 
[OWASP Poland Day] Security knowledge framework
OWASP
 
[OWASP Poland Day] Saving private token
OWASP
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
Best Practices for Configuring Your OSSIM Installation
AlienVault
 
[OWASP Poland Day] OWASP for testing mobile applications
OWASP
 
Ten Tools for Security Professionals
McGrewSecurity
 
Next-Gen Security Solution: Gateway Protection
Quick Heal Technologies Ltd.
 
Mod Security
Abhishek Singh
 

Similar to Managing Application Config and Secrets (20)

PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Private Cloud
 
PPTX
Azure Fundamentals Part 3
CCG
 
PDF
Azure Security Overview
David J Rosenthal
 
PPTX
Azure Security Compass v1.1 - Presentation.pptx
ZaheerEbrahim5
 
PDF
Global Azure Bootcamp 2018 - Azure Security Center
Scott Hoag
 
PPTX
Make your Azure PaaS Deployment More Safe
Thuan Ng
 
PDF
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
NCCOMMS
 
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
PPTX
Top 13 best security practices
Radu Vunvulea
 
PDF
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
PPTX
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
WinWire Technologies Inc
 
PDF
Azure Security Best Practises for Enterprises
Nuvento Systems Pvt Ltd
 
PPTX
Sql server security in an insecure world
Gianluca Sartori
 
PDF
Web application security (eng)
Anatoliy Okhotnikov
 
PPTX
Top 10 Azure Security Best Practices (1).pptx
HichamNiamane1
 
PPTX
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
PPTX
Defense In Depth With AOP
nerdybeardo
 
PPTX
Improving Application Security With Azure
Softchoice Corporation
 
PDF
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Alert Logic
 
PPTX
SC-900 Capabilities of Microsoft Security Solutions
FredBrandonAuthorMCP
 
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Private Cloud
 
Azure Fundamentals Part 3
CCG
 
Azure Security Overview
David J Rosenthal
 
Azure Security Compass v1.1 - Presentation.pptx
ZaheerEbrahim5
 
Global Azure Bootcamp 2018 - Azure Security Center
Scott Hoag
 
Make your Azure PaaS Deployment More Safe
Thuan Ng
 
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
NCCOMMS
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Top 13 best security practices
Radu Vunvulea
 
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
WinWire Technologies Inc
 
Azure Security Best Practises for Enterprises
Nuvento Systems Pvt Ltd
 
Sql server security in an insecure world
Gianluca Sartori
 
Web application security (eng)
Anatoliy Okhotnikov
 
Top 10 Azure Security Best Practices (1).pptx
HichamNiamane1
 
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
Defense In Depth With AOP
nerdybeardo
 
Improving Application Security With Azure
Softchoice Corporation
 
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Alert Logic
 
SC-900 Capabilities of Microsoft Security Solutions
FredBrandonAuthorMCP
 
Ad

More from Eng Teong Cheah (20)

PDF
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
PDF
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
PDF
Monitoring Models
Eng Teong Cheah
 
PDF
Responsible Machine Learning
Eng Teong Cheah
 
PDF
Training Optimal Models
Eng Teong Cheah
 
PDF
Deploying Models
Eng Teong Cheah
 
PDF
Machine Learning Workflows
Eng Teong Cheah
 
PDF
Working with Compute
Eng Teong Cheah
 
PDF
Working with Data
Eng Teong Cheah
 
PDF
Experiments & TrainingModels
Eng Teong Cheah
 
PDF
Automated Machine Learning
Eng Teong Cheah
 
PDF
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
PDF
Hacking Containers - Container Storage
Eng Teong Cheah
 
PDF
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
PDF
Hacking Containers - Linux Containers
Eng Teong Cheah
 
PDF
Data Security - Storage Security
Eng Teong Cheah
 
PDF
Application Security- App security
Eng Teong Cheah
 
PDF
Compute Security - Container Security
Eng Teong Cheah
 
PDF
Access Security - Hybrid Identity
Eng Teong Cheah
 
PDF
Access Security - Privileged Identity Management
Eng Teong Cheah
 
Modern Cross-Platform Apps with .NET MAUI
Eng Teong Cheah
 
Efficiently Removing Duplicates from a Sorted Array
Eng Teong Cheah
 
Monitoring Models
Eng Teong Cheah
 
Responsible Machine Learning
Eng Teong Cheah
 
Training Optimal Models
Eng Teong Cheah
 
Deploying Models
Eng Teong Cheah
 
Machine Learning Workflows
Eng Teong Cheah
 
Working with Compute
Eng Teong Cheah
 
Working with Data
Eng Teong Cheah
 
Experiments & TrainingModels
Eng Teong Cheah
 
Automated Machine Learning
Eng Teong Cheah
 
Getting Started with Azure Machine Learning
Eng Teong Cheah
 
Hacking Containers - Container Storage
Eng Teong Cheah
 
Hacking Containers - Looking at Cgroups
Eng Teong Cheah
 
Hacking Containers - Linux Containers
Eng Teong Cheah
 
Data Security - Storage Security
Eng Teong Cheah
 
Application Security- App security
Eng Teong Cheah
 
Compute Security - Container Security
Eng Teong Cheah
 
Access Security - Hybrid Identity
Eng Teong Cheah
 
Access Security - Privileged Identity Management
Eng Teong Cheah
 
Ad

Recently uploaded (20)

PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 

Managing Application Config and Secrets