SlideShare a Scribd company logo
@CoverosGene
Open Source Security Tools
for the Pipeline
@CoverosGene
Everything can’t be first or last
Do just enough of each
type of testing early in the
pipeline to determine if
further testing is justified.
@CoverosGene
Reduce your code footprint
mvn dependency:tree
mvn dependency:analyze
mvn com.ning.maven.plugins:
maven-dependency-versions-check-plugin
@CoverosGene
Keep libraries up-to-date
@CoverosGene
Poor quality means hard to secure
@CoverosGene
Make sure your code is tested
@CoverosGene
Test what users can’t do
User role testing
@CoverosGene
Proxy your functional tests
OWASP ZAP
passive proxy
active scanner
fuzzer
@CoverosGene
Repeatable, reliable deployments
@CoverosGene
Audit yourself
@CoverosGene
Scan the system baseline
@CoverosGene
Scan the web server configuration
@CoverosGene
Scan the web app
@CoverosGene
Don’t forget the database
@CoverosGene
Keep packages up-to-date
@CoverosGene
Scan all the systems
don’t forget the infrastructure
@CoverosGene
Plan for failure
@CoverosGene
Protect the systems
@CoverosGene
Don’t expect perfectly secure
A little better is
still better.
Keep improving.
@CoverosGene
Find more tools

More Related Content

What's hot (20)

PDF
Continuous Deployment Pipeline for Systems at Cascadia IT Conference - 2017-0...
garrett honeycutt
 
PDF
Building a Secure DevOps Pipeline - for your AppSec Program
Matt Tesauro
 
PPTX
An experiment in agile threat modelling
DevSecCon
 
PDF
Jenkins with SonarQube
Somkiat Puisungnoen
 
PDF
Continuous Security: Using Automation to Expand Security's Reach
Matt Tesauro
 
PDF
Ava unit test
Mohamed Ahmed
 
PDF
Afterlife tales -> troubleshooting containerized applications
Ana-Maria Mihalceanu
 
PDF
Optimize and maintain your project in Xcode.
Bryn Bodayle
 
PPTX
Cypress first impressions
Hans Emmel
 
PPTX
Introduction to cypress in Angular (Chinese)
Hong Tat Yew
 
PDF
The Shortest Article about a Check of nginx
Andrey Karpov
 
PPT
Automating security test using Selenium and OWASP ZAP - Practical DevSecOps
Mohammed A. Imran
 
PDF
Microservices testing in distributed systems
Isa Vilacides
 
PPTX
Static code analysis with sonar qube
Hayi Nukman
 
PPTX
Beyond the basics of SonarQube: improve your Java(Script) code even further
Johan Janssen
 
PPTX
Google, quality and you
nelinger
 
PDF
Cloud native resiliency patterns from the ground up
Ana-Maria Mihalceanu
 
PDF
The Dog Ate My Deployment - Symfony Usergroup Cologne July 2013
D
 
PPTX
The Dog Ate My Deployment - PHP Uncoference September 2013
D
 
PDF
Dennis Benkert - The Dog Ate My Deployment - Symfony Usergroup Berlin March ...
D
 
Continuous Deployment Pipeline for Systems at Cascadia IT Conference - 2017-0...
garrett honeycutt
 
Building a Secure DevOps Pipeline - for your AppSec Program
Matt Tesauro
 
An experiment in agile threat modelling
DevSecCon
 
Jenkins with SonarQube
Somkiat Puisungnoen
 
Continuous Security: Using Automation to Expand Security's Reach
Matt Tesauro
 
Ava unit test
Mohamed Ahmed
 
Afterlife tales -> troubleshooting containerized applications
Ana-Maria Mihalceanu
 
Optimize and maintain your project in Xcode.
Bryn Bodayle
 
Cypress first impressions
Hans Emmel
 
Introduction to cypress in Angular (Chinese)
Hong Tat Yew
 
The Shortest Article about a Check of nginx
Andrey Karpov
 
Automating security test using Selenium and OWASP ZAP - Practical DevSecOps
Mohammed A. Imran
 
Microservices testing in distributed systems
Isa Vilacides
 
Static code analysis with sonar qube
Hayi Nukman
 
Beyond the basics of SonarQube: improve your Java(Script) code even further
Johan Janssen
 
Google, quality and you
nelinger
 
Cloud native resiliency patterns from the ground up
Ana-Maria Mihalceanu
 
The Dog Ate My Deployment - Symfony Usergroup Cologne July 2013
D
 
The Dog Ate My Deployment - PHP Uncoference September 2013
D
 
Dennis Benkert - The Dog Ate My Deployment - Symfony Usergroup Berlin March ...
D
 

Similar to Open Source Security Tools for the Pipeline (20)

PPTX
Tests your pipeline might be missing
Gene Gotimer
 
PPTX
Tests Your Pipeline Might Be Missing
Coveros, Inc.
 
PDF
Tests Your Pipeline Might Be Missing
Gene Gotimer
 
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
PPTX
Add Security Testing Tools to Your Delivery Pipeline
Gene Gotimer
 
PDF
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
NETWAYS
 
PPTX
DevSecOps pipeline for all.Security YTools, STeps
DurkanyaR
 
PDF
Building the Pipeline of My Dreams
Gene Gotimer
 
PPTX
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Gene Gotimer
 
PPTX
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Coveros, Inc.
 
PDF
Security in open source projects
Jose Manuel Ortega Candel
 
PDF
Cross-Build Injection attacks: how safe is your Java build?
Sander Mak (@Sander_Mak)
 
PDF
How is this sausage made
dejanb
 
PDF
OpenSSF.Repository.WG.Presentation.OpenSSF.Repository.WG.Presentation
kedofef453
 
PDF
Add Security Testing Tools to Your Delivery Pipeline
TechWell
 
PDF
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
 
ODP
Are you using an opensource library? There's a good chance you are vulnerable...
Codemotion
 
PDF
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
ODP
Making security-agile matt-tesauro
Matt Tesauro
 
PDF
Securing the Pipeline
Thoughtworks
 
Tests your pipeline might be missing
Gene Gotimer
 
Tests Your Pipeline Might Be Missing
Coveros, Inc.
 
Tests Your Pipeline Might Be Missing
Gene Gotimer
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Add Security Testing Tools to Your Delivery Pipeline
Gene Gotimer
 
stackconf 2024 | How to hack and defend (your) open source by Roman Zhukov.pdf
NETWAYS
 
DevSecOps pipeline for all.Security YTools, STeps
DurkanyaR
 
Building the Pipeline of My Dreams
Gene Gotimer
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Gene Gotimer
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Coveros, Inc.
 
Security in open source projects
Jose Manuel Ortega Candel
 
Cross-Build Injection attacks: how safe is your Java build?
Sander Mak (@Sander_Mak)
 
How is this sausage made
dejanb
 
OpenSSF.Repository.WG.Presentation.OpenSSF.Repository.WG.Presentation
kedofef453
 
Add Security Testing Tools to Your Delivery Pipeline
TechWell
 
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
lior mazor
 
Are you using an opensource library? There's a good chance you are vulnerable...
Codemotion
 
Preventing Supply Chain Attacks on Open Source Software
All Things Open
 
Making security-agile matt-tesauro
Matt Tesauro
 
Securing the Pipeline
Thoughtworks
 
Ad

More from Gene Gotimer (20)

PDF
Let's Do Bad Things to Unsecured Containers
Gene Gotimer
 
PDF
Clean Your Cloud with Cloud Custodian slides
Gene Gotimer
 
PDF
A Hands-on Intro to Containers- Nebraska.Code()
Gene Gotimer
 
PDF
A Developer's Guide to Kubernetes Security
Gene Gotimer
 
PDF
Fixing Git Catastrophes - Nebraska.Code()
Gene Gotimer
 
PDF
KCDC- Keeping Secrets Out of Your Pipeline
Gene Gotimer
 
PDF
How Fast Is My App? Performance Testing 101
Gene Gotimer
 
PDF
A Developer’s Guide to Kubernetes Security
Gene Gotimer
 
PDF
How I Learned to Stop Worrying and Love Legacy Code
Gene Gotimer
 
PDF
Ten Ways To Doom Your DevOps
Gene Gotimer
 
PPTX
Keeping Your Kubernetes Cluster Secure
Gene Gotimer
 
PDF
Keeping your Kubernetes Cluster Secure
Gene Gotimer
 
PDF
Explain DevOps To Me Like I’m Five: DevOps for Managers
Gene Gotimer
 
PPTX
Keeping your Kubernetes Cluster Secure
Gene Gotimer
 
PPTX
Creative Solutions to Already Solved Problems II
Gene Gotimer
 
PPTX
Creative Solutions to Already Solved Problems
Gene Gotimer
 
PDF
Get to Green: How to Safely Refactor Legacy Code
Gene Gotimer
 
PDF
DevOps for Leadership
Gene Gotimer
 
PDF
Pyramid Discussion: DevOps Adoption in Large, Slow Organizations
Gene Gotimer
 
PPTX
A better faster pipeline for software delivery, even in the government
Gene Gotimer
 
Let's Do Bad Things to Unsecured Containers
Gene Gotimer
 
Clean Your Cloud with Cloud Custodian slides
Gene Gotimer
 
A Hands-on Intro to Containers- Nebraska.Code()
Gene Gotimer
 
A Developer's Guide to Kubernetes Security
Gene Gotimer
 
Fixing Git Catastrophes - Nebraska.Code()
Gene Gotimer
 
KCDC- Keeping Secrets Out of Your Pipeline
Gene Gotimer
 
How Fast Is My App? Performance Testing 101
Gene Gotimer
 
A Developer’s Guide to Kubernetes Security
Gene Gotimer
 
How I Learned to Stop Worrying and Love Legacy Code
Gene Gotimer
 
Ten Ways To Doom Your DevOps
Gene Gotimer
 
Keeping Your Kubernetes Cluster Secure
Gene Gotimer
 
Keeping your Kubernetes Cluster Secure
Gene Gotimer
 
Explain DevOps To Me Like I’m Five: DevOps for Managers
Gene Gotimer
 
Keeping your Kubernetes Cluster Secure
Gene Gotimer
 
Creative Solutions to Already Solved Problems II
Gene Gotimer
 
Creative Solutions to Already Solved Problems
Gene Gotimer
 
Get to Green: How to Safely Refactor Legacy Code
Gene Gotimer
 
DevOps for Leadership
Gene Gotimer
 
Pyramid Discussion: DevOps Adoption in Large, Slow Organizations
Gene Gotimer
 
A better faster pipeline for software delivery, even in the government
Gene Gotimer
 
Ad

Recently uploaded (20)

PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PPTX
Hardware(Central Processing Unit ) CU and ALU
RizwanaKalsoom2
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PPTX
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
PPTX
Tally software_Introduction_Presentation
AditiBansal54083
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PDF
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
PPTX
Human Resources Information System (HRIS)
Amity University, Patna
 
PDF
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
PDF
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
PDF
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PPTX
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
Digger Solo: Semantic search and maps for your local files
seanpedersen96
 
PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PDF
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
Hardware(Central Processing Unit ) CU and ALU
RizwanaKalsoom2
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Migrating Millions of Users with Debezium, Apache Kafka, and an Acyclic Synch...
MD Sayem Ahmed
 
Tally software_Introduction_Presentation
AditiBansal54083
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
Human Resources Information System (HRIS)
Amity University, Patna
 
Alexander Marshalov - How to use AI Assistants with your Monitoring system Q2...
VictoriaMetrics
 
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Digger Solo: Semantic search and maps for your local files
seanpedersen96
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 

Open Source Security Tools for the Pipeline

Editor's Notes

  • #2: I’m going to talk about getting some open source security tools into your pipeline, but it isn’t really so much about the tools as it is about the process- looking for places and opportunities to do security testing. Remember that security isn’t about compliance rules, but about trying to be more secure.
  • #3: As we build out our pipeline, we want to do just enough of each type of testing to know if further testing is worthwhile. So we want to do the easy stuff first, the tests that are going to catch the most. That goes for whether we are doing quality checks or for security checks.
  • #4: So start with your source code. Reduce your code footprint. Make your attack surface smaller. Dependency management tools like Apache Maven can identify libraries you are including but aren’t actually using.
  • #5: Once you get rid of the excess, use OWASP Dependency Check to see if the remaining libraries have known vulnerabilities. Update any libraries that do. It works for a bunch of different languages.
  • #6: Use static analysis to keep your code clean. Part of security is understanding code behaviors, inputs and outputs, and that is easier to do with clean code. High quality code is easier to secure than poor quality code.
  • #7: Also, make sure your code is tested. Not just “did the code run while I was running the unit tests,” but actually tested. Mutation testing tools can tell you if your unit tests are valuable and if any tests you should be doing are missing.
  • #8: Functional test tools like Selenium can help with security testing, looking for things that users cannot do or should not be able to do. I should be able to see my account info, but not see theirs. An admin should see this menu, a regular user shouldn’t.
  • #9: And run those tests through a passive proxy like OWASP ZAP. You get some extra security testing for almost no effort while you are running functional and regression tests to pump traffic the scanner.
  • #10: Make sure you have repeatable, reliable deployments. Chef, Ansible, Puppet. Whatever tool you are using to automate your deployments. That way you know the environment faithfully represents production.
  • #11: Also, Chef InSpec can do your audits, regardless the CM tool you are using. It might not replace your “official” audit, but it can be used so that you have confidence that the “official” audit won’t bring up any surprises when it is too late to do anything about them.
  • #12: OpenSCAP. Scan your baselines before your deploys so you know you aren’t building on an insecure foundation. And scan after your deployments so you know you haven’t introduced any new problems yourself.
  • #13: Make sure that your web server or an application server configured correctly and securely. Nikto2 can scan your web server to make sure it isn’t leaking information, directories are locked down against enumeration attacks, best practices like that.
  • #14: Of course scan the web app itself. Even if the security team is going to do a scan right before release with an expensive tool that you don’t have access to doesn’t mean you shouldn’t take the time to do your own scan to avoid any late surprises.
  • #15: Once the system is all set up, don’t forget about the database. Sqlmap can look for injection problems through the web front end to see if an end user could exploit the database without ever getting command-line access to the system.
  • #16: Keep your system packages up-to-date, just like you keep your libraries up-to-date. These aren’t strictly open source, but they are important. And consider subscribing to the US-CERT Weekly Vulnerability Summary, so you can stay informed.
  • #17: Scan all the systems even infrastructure like your CI server, source code repo, issue tracking systems. Use a vulnerability scanner like OpenVAS, the open-source fork of Nessus. And you can look for unexpected open ports or unrecognized systems on you network with a tool like Nmap.
  • #18: Things will break. You’ll never recover gracefully from a system crash if the first time you try is with users screaming and management crying, or vice-versa. Practice recovering from failures so that it becomes second nature using a tool like Chaos Monkey from the Netflix Simian Army.
  • #19: There is no such thing in the cloud as “just a development server” that doesn’t need to be secured. Secure everything. Use Fail2Ban to protect against brute force attacks. Aide is a file integrity monitor like Tripwire so you can see if anything on your system has been altered without your knowledge.
  • #20: Continuously improve. Don’t expect to ever be 100% secure. Always look for new opportunities to add more security testing to the pipeline. A little better is still better.
  • #21: And if you are looking for inspiration for more tools to use, think about downloading Kali Linux. Hundreds of security tools, all preinstalled and cataloged for you to experiment with. Thank you.