SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Security in DevOps
Taro Lay (賴天騎)
Co-Founder – Kalama Cyber
Taro Lay (賴天騎)
Cyber Security Evangelist
Director of Professional Services at PT. Seraphim Digital
Technology
Founder of Kalama Cyber Foundation
Professional penetration tester
Digital security consultant
Been around in Digital Security arena around 30 years
Dedicate 25% his time for digital security research
@kalama_security @TaroLay
Who Am I
Security Essentials
Security Foundation
• Establish a sound security policy as the
“foundation” for design
• Treat security as an integral part of the overall
system design.
• Delineate the physical and logical security
boundaries governed by associated security
policies
• Train developers on secure software
Security Essentials
Risk Based
• Reduce risk to an acceptable level
• Assume external systems are insecure
• Implement tailored system security measures
to meet goals
• Protect information while processed, in transit,
and in storage.
• Consider custom products to achieve
adequate security
• Protect against all likely classes of “attacks”
Function vs Risk
Traditional vs Modern Application
Monolithic vs Micro Services
The major difference between
Agile vs. Waterfall might be
summarized by saying that the
waterfall approach values
planning ahead, while the agile
approach values adaptability
and involvement.
Waterfall vs Agile
Dev-Ops
Dev- Sec -Ops
Application Security Layers
App level security (libs, code,
data)
OS / Network / Physical Access
Intra-services communication (auth, azn,
TLS)
Hypervisor, images (VM/Docker)
Security Testing in SDLC
Security Testing in SDLC
Application Security Layers
OWASP Top 10 - 2021
A1-Broken Access Control
A2-Cryptographic Failures
A3-Injection
A4-Insecure Design
A5-Security Misconfiguration
A6-Vulnerable and Outdated Components
A7-Identification and Authentication Failure
A8-Software and Data Integrity Failures
A9-Security Logging and Monitoring Failures
A10-Server-side Request Forgery (SSRF)
Bridging the gaps
Common goals Streamlined Workflow Integrated Tools
● Security Training
● Lunch and learn
● Lingo and
terminology
● Agile development
● Ticketing system
● Continuous
integration
Cost of Flaw
TOTAL POTENTIAL
SECURITY ISSUES
● Null pointer dereference
● Threading issues
● Code quality issues
● Issues in dead code
● Insecure crypto functions
● Issues in back-end
application code
● Complex injection issues
● Issues in non-web app code
SAST Only
● Environment
configuration issues
● Patch level issues
● Runtime privileges issues
● Authentication issues
● Protocol parser issues
● Session management
issues
● Issues in 3rd party web
components
● Cross-site request
forgery
● Malware analysis
DAST Only
● SQL Injection
● Cross Site Scripting
● HTTP Response Splitting
● OS Commanding
● LDAP Injection
● XPath Injection
● Path Traversal
● Buffer Overflows
● Format String Issues
● Etc.
DAST & SAST
Application Security Issues
Thankyou!
Taro Lay, (賴天騎)
Cybersecurity Evangelist
<tarolay@kalama.id>
@kalama_security @TaroLay
IT Sec's Role in the Implementation of DevOps
Rei Munisati
( Head of IT Security & Risk Compliance – Home Credit Indonesia )
Let’s Get To Know Each Other
Rei Munisati
Head of IT Security & Risk Compliance
@ Home Credit Indonesia
Experienced in Banking, Insurance and Technology
industries focusing on Information Security, Data
Privacy, GRC, Third Party Security, Audit &
Remediation Management roles.
What is DevSecOps?
The main objective of DevSecOps is to automate,
monitor and apply security at all phases of the
software lifecycle, i.e., plan, develop, build, test,
release, deploy, operate and monitor. Applying
security at every stage of the software development
process enables continuous integration, reducing the
cost of compliance and delivering software more
rapidly
DevSecOps:
How important is it really?
• Agile took us from months to days to deliver software
• DevOps took us from months to minutes to deploy software
• More applications are mission critical
• Now security has become the bottleneck
The Evolution of Security Tools
Duration 2-4 weeks 1-2 weeks Continuous and Real-time
Penetration Testing
Tools
• Port Scanners
• Vulnerability Scanner
• Exploitation Tools
Audience
• Security Professionals
Secure SDLC
Tools
• Code Security Scanners
• Dynamic Security Scanners
• Vulnerability Scanners
Audience
• Security Professionals in
Enterprise Security Teams
DeVSecOps
Tools
• Code Security Scanners
• Interactive Security Scanners
• Runtime Application Self
Protection
Audience
• Developers in Product Teams
Phase of DevSecOps
• Secret Scanning
• Software Composition Analysis (SCA)
• Static Analysis Security Testing (SAST)
• Dynamic Analysis Security Testing (DAST)
• Security in Infrastructure as Code
• RunTime Application Self-Protection (RASP)
• Vulnerability Management (VA)
• Alert and Monitoring in Security
For Starter in DevSecOps
Secret Scanning
• Sensitive information such as the access keys, access tokens, SSH keys, etc.
• Work on pure Regex-based approach for filtering sensitive data
Tools :
1. Detect-Secrets
2. Truffle Hog
Software Composition Analysis
• Software Composition Analysis (SCA) is an application security
methodology for managing open-source components.
• Disc over all related components, their supporting libraries, and their
direct and indirect dependencies
Tools :
1. Snyk ( All )
2. Find-sec-bugs ( Java )
3. RetireJS ( JavaScript / NodeJS )
4. Bundler-audit ( Ruby )
5. Bandit, safety ( Python )
Static Analysis Security Testing
• White-box security testing using automated tools
• Useful for weeding out low-hanging fruits like SQL Injection, Cross-Site
Scripting, insecure libraries, etc.
• Needs manual oversight for managing false-positives
Tools : SonarQube
Dynamic Analysis Security Testing
• Black/Grey-box security testing using automated tools
• DAST will help in picking out deployment specific issues
• Results from DAST and SAST can be compared to weed out false-positives
“ We can use tools pentest but must support cmd and export file “
Tools : 1. Nmap
2. Nikto
3. SQLMap
4. Nessus
5. Burpsuite
Security in Infrastructure Code
• Infrastructure as a code allows you to document and version control the infra
• It also allows you to perform audit on the infrastructure
• Environment is as secure as the base image container
• Hardening your server with automation ( Compliance as Code)
Tools : 1. Ansible
2. Inspec
3. Clair
4. Anchore
5. Dockscan
Infrastructure Code
Image Scanning
Hardening
Vulnerability Management
• A central dashboard is required to normalize the data
• Vulnerability Management System can then be integrated to bug tracking system
Tools : 1. Defect Dojo
2. Archery
Alert and Monitoring Security
Monitoring is needed for two end goals
• Understand if our security controls are effective
• What and where we need to improve
"Detect, Mitigation ,and Maintain Continuous Security"
Tools : 1. Grafana
2. elk
3. Dynatrace
4. Aqua Security
5. Imperva
DevSecOps Pipeline
Inject Security in Process DevOps
Pre-Commit
Hooks
IDE Plugins
Developer
Secrets
Management
Code
Repository
SAST
SCA
Pre-Build
DAST
Post-Build
Manual Web
Application
Pentesting
QA/Staging Sec in IaC
Compliance as
Code
Alerting and
Monitoring
Production
Build Artifact
versioning
against code
commits
Artifact
Repository
CI/CD Server
V u l n e r a b i l i t y M a n a g e m e n t
Sample Pipeline
Build
Artifactory
Deploy
Staging
Setup
Staging
Deploy UAT Test
PROD
Setup
PROD Deploy
Approval
PROD
Deploy
Start End
DevOps Pipeline
Build
Artifactory
Deploy
SAST
(Dependency
Check)
Stagin
g
Setup
Staging
Deploy
UAT
Test
DAST
PROD
Setup
INFRA
Setup
INFRA
Scan
Compliance
Scan
PROD
Deploy
Approval
PROD
Deploy
WAF
Deploy
Start End
DevSecOps Pipeline
Benefits & Conclusions
✔ Integrate Security via Tools
✔ Security as Code
✔ Faster Release Cycles
✔ Prevent Security Bugs in PROD
✔ Shorter Feedback Cycle
Developer
Secret
Management Pre-Build Post-Build
Deploy
Test
Deploy
PROD
Pre-Commit H. SCA
SAST
DAST Security in IAC
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

DevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD ProfessionalsDevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD Professionals
Tonex
 

Was ist angesagt? (20)

Dev secops security and compliance at the speed of continuous delivery - owasp
Dev secops  security and compliance at the speed of continuous delivery - owaspDev secops  security and compliance at the speed of continuous delivery - owasp
Dev secops security and compliance at the speed of continuous delivery - owasp
 
Introduction to CICD
Introduction to CICDIntroduction to CICD
Introduction to CICD
 
#speakgell - Continuous Integration in iconnect360
#speakgell - Continuous Integration in iconnect360#speakgell - Continuous Integration in iconnect360
#speakgell - Continuous Integration in iconnect360
 
SRE 101 (Site Reliability Engineering)
SRE 101 (Site Reliability Engineering)SRE 101 (Site Reliability Engineering)
SRE 101 (Site Reliability Engineering)
 
Azure DevOps
Azure DevOpsAzure DevOps
Azure DevOps
 
Security Implications for a DevOps Transformation
Security Implications for a DevOps TransformationSecurity Implications for a DevOps Transformation
Security Implications for a DevOps Transformation
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
 
Why source control your Oracle Database?
Why source control your Oracle Database?Why source control your Oracle Database?
Why source control your Oracle Database?
 
Automating security tests for Continuous Integration
Automating security tests for Continuous IntegrationAutomating security tests for Continuous Integration
Automating security tests for Continuous Integration
 
DevOps for absolute beginners
DevOps for absolute beginnersDevOps for absolute beginners
DevOps for absolute beginners
 
DevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD ProfessionalsDevOps Workshop, DevOps for DoD Professionals
DevOps Workshop, DevOps for DoD Professionals
 
CI/CD Best Practices for Your DevOps Journey
CI/CD Best  Practices for Your DevOps JourneyCI/CD Best  Practices for Your DevOps Journey
CI/CD Best Practices for Your DevOps Journey
 
Continuous Integration
Continuous IntegrationContinuous Integration
Continuous Integration
 
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
#ATAGTR2019 Presentation "DevSecOps with GitLab" By Avishkar Nikale
 
The Art of Container Monitoring
The Art of Container MonitoringThe Art of Container Monitoring
The Art of Container Monitoring
 
Why Serverless?
Why Serverless?Why Serverless?
Why Serverless?
 
Standardizing Jenkins with CloudBees Jenkins Team
Standardizing Jenkins with CloudBees Jenkins TeamStandardizing Jenkins with CloudBees Jenkins Team
Standardizing Jenkins with CloudBees Jenkins Team
 
Conquering Chaos: Helix & DevOps
Conquering Chaos: Helix & DevOpsConquering Chaos: Helix & DevOps
Conquering Chaos: Helix & DevOps
 

Ähnlich wie TechTalk 2021: Peran IT Security dalam Penerapan DevOps

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 

Ähnlich wie TechTalk 2021: Peran IT Security dalam Penerapan DevOps (20)

AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
Security Process in DevSecOps
Security Process in DevSecOpsSecurity Process in DevSecOps
Security Process in DevSecOps
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSourceDevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
DevSecOps 101
DevSecOps 101DevSecOps 101
DevSecOps 101
 
Terrascan - Cloud Native Security Tool
Terrascan - Cloud Native Security Tool Terrascan - Cloud Native Security Tool
Terrascan - Cloud Native Security Tool
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...
 
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - SonatypeOpen DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
Open DevSecOps 2019 - Securing the Software Supply Chain - Sonatype
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 

Mehr von DicodingEvent

Mehr von DicodingEvent (20)

Developer Coaching #114.pdf
Developer Coaching #114.pdfDeveloper Coaching #114.pdf
Developer Coaching #114.pdf
 
Ask Us Anything about Studi Independen Bersertifikat Kampus Merdeka X Dicodin...
Ask Us Anything about Studi Independen Bersertifikat Kampus Merdeka X Dicodin...Ask Us Anything about Studi Independen Bersertifikat Kampus Merdeka X Dicodin...
Ask Us Anything about Studi Independen Bersertifikat Kampus Merdeka X Dicodin...
 
tantangan menjadi developer di abad 21
tantangan menjadi developer di abad 21tantangan menjadi developer di abad 21
tantangan menjadi developer di abad 21
 
Mengenalkan augmented reality (ar) pada snapchat
Mengenalkan augmented reality (ar) pada snapchatMengenalkan augmented reality (ar) pada snapchat
Mengenalkan augmented reality (ar) pada snapchat
 
Membangun Aplikasi Serverless di Platfrom AWS
Membangun Aplikasi Serverless di Platfrom AWSMembangun Aplikasi Serverless di Platfrom AWS
Membangun Aplikasi Serverless di Platfrom AWS
 
IDCamp X Madrasah: Pengenalan Computational Thinking
IDCamp X Madrasah: Pengenalan Computational ThinkingIDCamp X Madrasah: Pengenalan Computational Thinking
IDCamp X Madrasah: Pengenalan Computational Thinking
 
Membuat Produk Digital Terbaik ala Startup Unicorn
Membuat Produk Digital Terbaik ala Startup UnicornMembuat Produk Digital Terbaik ala Startup Unicorn
Membuat Produk Digital Terbaik ala Startup Unicorn
 
TechTalk 2021: Peningkatan Performa Software Delivery dengan CI/CD
TechTalk 2021: Peningkatan Performa Software Delivery dengan CI/CDTechTalk 2021: Peningkatan Performa Software Delivery dengan CI/CD
TechTalk 2021: Peningkatan Performa Software Delivery dengan CI/CD
 
Membuat Solusi Bermanfaat dengan Programming - Nur Rohman
Membuat Solusi Bermanfaat dengan Programming - Nur RohmanMembuat Solusi Bermanfaat dengan Programming - Nur Rohman
Membuat Solusi Bermanfaat dengan Programming - Nur Rohman
 
Potensi karier menjadi ios developer di masa depan
Potensi karier menjadi ios developer di masa depanPotensi karier menjadi ios developer di masa depan
Potensi karier menjadi ios developer di masa depan
 
Id camp x dicoding live : persiapan jadi software engineer hebat 101
Id camp x dicoding live : persiapan jadi software engineer hebat 101Id camp x dicoding live : persiapan jadi software engineer hebat 101
Id camp x dicoding live : persiapan jadi software engineer hebat 101
 
Tips sukses berkarir sebagai developer dan programmer 2021
Tips sukses berkarir sebagai developer dan programmer 2021Tips sukses berkarir sebagai developer dan programmer 2021
Tips sukses berkarir sebagai developer dan programmer 2021
 
Teknologi Baru Android di Google I/O 2021 - Andrew Kurniadi
Teknologi Baru Android di Google I/O 2021 - Andrew KurniadiTeknologi Baru Android di Google I/O 2021 - Andrew Kurniadi
Teknologi Baru Android di Google I/O 2021 - Andrew Kurniadi
 
Dicoding Developer Coaching #38: Android | 5 Library Android yang Patut Kamu ...
Dicoding Developer Coaching #38: Android | 5 Library Android yang Patut Kamu ...Dicoding Developer Coaching #38: Android | 5 Library Android yang Patut Kamu ...
Dicoding Developer Coaching #38: Android | 5 Library Android yang Patut Kamu ...
 
Dicoding Developer Coaching #37: Android | Kesalahan yang Sering Terjadi pada...
Dicoding Developer Coaching #37: Android | Kesalahan yang Sering Terjadi pada...Dicoding Developer Coaching #37: Android | Kesalahan yang Sering Terjadi pada...
Dicoding Developer Coaching #37: Android | Kesalahan yang Sering Terjadi pada...
 
Pengantar Cloud Computing dengan AWS - Petra Novandi Barus
Pengantar Cloud Computing dengan AWS - Petra Novandi BarusPengantar Cloud Computing dengan AWS - Petra Novandi Barus
Pengantar Cloud Computing dengan AWS - Petra Novandi Barus
 
Dicoding Developer Coaching #36: Android | Pentingnya Performa pada Aplikasi ...
Dicoding Developer Coaching #36: Android | Pentingnya Performa pada Aplikasi ...Dicoding Developer Coaching #36: Android | Pentingnya Performa pada Aplikasi ...
Dicoding Developer Coaching #36: Android | Pentingnya Performa pada Aplikasi ...
 
Dicoding Developer Coaching #34: Android | Modular Android App dengan Dynamic...
Dicoding Developer Coaching #34: Android | Modular Android App dengan Dynamic...Dicoding Developer Coaching #34: Android | Modular Android App dengan Dynamic...
Dicoding Developer Coaching #34: Android | Modular Android App dengan Dynamic...
 
Dicoding Developer Coaching #35: Android | Setup Continuous Integration di An...
Dicoding Developer Coaching #35: Android | Setup Continuous Integration di An...Dicoding Developer Coaching #35: Android | Setup Continuous Integration di An...
Dicoding Developer Coaching #35: Android | Setup Continuous Integration di An...
 
Dicoding Developer Coaching #33: Android | Depedency Injection dengan Dagger,...
Dicoding Developer Coaching #33: Android | Depedency Injection dengan Dagger,...Dicoding Developer Coaching #33: Android | Depedency Injection dengan Dagger,...
Dicoding Developer Coaching #33: Android | Depedency Injection dengan Dagger,...
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

TechTalk 2021: Peran IT Security dalam Penerapan DevOps

  • 1. Security in DevOps Taro Lay (賴天騎) Co-Founder – Kalama Cyber
  • 2. Taro Lay (賴天騎) Cyber Security Evangelist Director of Professional Services at PT. Seraphim Digital Technology Founder of Kalama Cyber Foundation Professional penetration tester Digital security consultant Been around in Digital Security arena around 30 years Dedicate 25% his time for digital security research @kalama_security @TaroLay Who Am I
  • 3. Security Essentials Security Foundation • Establish a sound security policy as the “foundation” for design • Treat security as an integral part of the overall system design. • Delineate the physical and logical security boundaries governed by associated security policies • Train developers on secure software
  • 4. Security Essentials Risk Based • Reduce risk to an acceptable level • Assume external systems are insecure • Implement tailored system security measures to meet goals • Protect information while processed, in transit, and in storage. • Consider custom products to achieve adequate security • Protect against all likely classes of “attacks”
  • 6. Traditional vs Modern Application
  • 8. The major difference between Agile vs. Waterfall might be summarized by saying that the waterfall approach values planning ahead, while the agile approach values adaptability and involvement. Waterfall vs Agile
  • 11. Application Security Layers App level security (libs, code, data) OS / Network / Physical Access Intra-services communication (auth, azn, TLS) Hypervisor, images (VM/Docker)
  • 15. OWASP Top 10 - 2021 A1-Broken Access Control A2-Cryptographic Failures A3-Injection A4-Insecure Design A5-Security Misconfiguration A6-Vulnerable and Outdated Components A7-Identification and Authentication Failure A8-Software and Data Integrity Failures A9-Security Logging and Monitoring Failures A10-Server-side Request Forgery (SSRF)
  • 16. Bridging the gaps Common goals Streamlined Workflow Integrated Tools ● Security Training ● Lunch and learn ● Lingo and terminology ● Agile development ● Ticketing system ● Continuous integration
  • 18. TOTAL POTENTIAL SECURITY ISSUES ● Null pointer dereference ● Threading issues ● Code quality issues ● Issues in dead code ● Insecure crypto functions ● Issues in back-end application code ● Complex injection issues ● Issues in non-web app code SAST Only ● Environment configuration issues ● Patch level issues ● Runtime privileges issues ● Authentication issues ● Protocol parser issues ● Session management issues ● Issues in 3rd party web components ● Cross-site request forgery ● Malware analysis DAST Only ● SQL Injection ● Cross Site Scripting ● HTTP Response Splitting ● OS Commanding ● LDAP Injection ● XPath Injection ● Path Traversal ● Buffer Overflows ● Format String Issues ● Etc. DAST & SAST Application Security Issues
  • 19. Thankyou! Taro Lay, (賴天騎) Cybersecurity Evangelist <tarolay@kalama.id> @kalama_security @TaroLay
  • 20.
  • 21. IT Sec's Role in the Implementation of DevOps Rei Munisati ( Head of IT Security & Risk Compliance – Home Credit Indonesia )
  • 22. Let’s Get To Know Each Other Rei Munisati Head of IT Security & Risk Compliance @ Home Credit Indonesia Experienced in Banking, Insurance and Technology industries focusing on Information Security, Data Privacy, GRC, Third Party Security, Audit & Remediation Management roles.
  • 23. What is DevSecOps? The main objective of DevSecOps is to automate, monitor and apply security at all phases of the software lifecycle, i.e., plan, develop, build, test, release, deploy, operate and monitor. Applying security at every stage of the software development process enables continuous integration, reducing the cost of compliance and delivering software more rapidly
  • 24. DevSecOps: How important is it really? • Agile took us from months to days to deliver software • DevOps took us from months to minutes to deploy software • More applications are mission critical • Now security has become the bottleneck
  • 25. The Evolution of Security Tools Duration 2-4 weeks 1-2 weeks Continuous and Real-time Penetration Testing Tools • Port Scanners • Vulnerability Scanner • Exploitation Tools Audience • Security Professionals Secure SDLC Tools • Code Security Scanners • Dynamic Security Scanners • Vulnerability Scanners Audience • Security Professionals in Enterprise Security Teams DeVSecOps Tools • Code Security Scanners • Interactive Security Scanners • Runtime Application Self Protection Audience • Developers in Product Teams
  • 26. Phase of DevSecOps • Secret Scanning • Software Composition Analysis (SCA) • Static Analysis Security Testing (SAST) • Dynamic Analysis Security Testing (DAST) • Security in Infrastructure as Code • RunTime Application Self-Protection (RASP) • Vulnerability Management (VA) • Alert and Monitoring in Security For Starter in DevSecOps
  • 27. Secret Scanning • Sensitive information such as the access keys, access tokens, SSH keys, etc. • Work on pure Regex-based approach for filtering sensitive data Tools : 1. Detect-Secrets 2. Truffle Hog
  • 28. Software Composition Analysis • Software Composition Analysis (SCA) is an application security methodology for managing open-source components. • Disc over all related components, their supporting libraries, and their direct and indirect dependencies Tools : 1. Snyk ( All ) 2. Find-sec-bugs ( Java ) 3. RetireJS ( JavaScript / NodeJS ) 4. Bundler-audit ( Ruby ) 5. Bandit, safety ( Python )
  • 29. Static Analysis Security Testing • White-box security testing using automated tools • Useful for weeding out low-hanging fruits like SQL Injection, Cross-Site Scripting, insecure libraries, etc. • Needs manual oversight for managing false-positives Tools : SonarQube
  • 30. Dynamic Analysis Security Testing • Black/Grey-box security testing using automated tools • DAST will help in picking out deployment specific issues • Results from DAST and SAST can be compared to weed out false-positives “ We can use tools pentest but must support cmd and export file “ Tools : 1. Nmap 2. Nikto 3. SQLMap 4. Nessus 5. Burpsuite
  • 31. Security in Infrastructure Code • Infrastructure as a code allows you to document and version control the infra • It also allows you to perform audit on the infrastructure • Environment is as secure as the base image container • Hardening your server with automation ( Compliance as Code) Tools : 1. Ansible 2. Inspec 3. Clair 4. Anchore 5. Dockscan Infrastructure Code Image Scanning Hardening
  • 32. Vulnerability Management • A central dashboard is required to normalize the data • Vulnerability Management System can then be integrated to bug tracking system Tools : 1. Defect Dojo 2. Archery
  • 33. Alert and Monitoring Security Monitoring is needed for two end goals • Understand if our security controls are effective • What and where we need to improve "Detect, Mitigation ,and Maintain Continuous Security" Tools : 1. Grafana 2. elk 3. Dynatrace 4. Aqua Security 5. Imperva
  • 35. Inject Security in Process DevOps Pre-Commit Hooks IDE Plugins Developer Secrets Management Code Repository SAST SCA Pre-Build DAST Post-Build Manual Web Application Pentesting QA/Staging Sec in IaC Compliance as Code Alerting and Monitoring Production Build Artifact versioning against code commits Artifact Repository CI/CD Server V u l n e r a b i l i t y M a n a g e m e n t
  • 36. Sample Pipeline Build Artifactory Deploy Staging Setup Staging Deploy UAT Test PROD Setup PROD Deploy Approval PROD Deploy Start End DevOps Pipeline Build Artifactory Deploy SAST (Dependency Check) Stagin g Setup Staging Deploy UAT Test DAST PROD Setup INFRA Setup INFRA Scan Compliance Scan PROD Deploy Approval PROD Deploy WAF Deploy Start End DevSecOps Pipeline
  • 37. Benefits & Conclusions ✔ Integrate Security via Tools ✔ Security as Code ✔ Faster Release Cycles ✔ Prevent Security Bugs in PROD ✔ Shorter Feedback Cycle Developer Secret Management Pre-Build Post-Build Deploy Test Deploy PROD Pre-Commit H. SCA SAST DAST Security in IAC