SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
Black Duck @ DocuSign
Scott M. Johnson
Lead PM – Technical Compliance
How DocuSign uses BlackDuck for
Devops, AppSec and Compliance
DocuSign is now a verb
The industry leader in signing is now building
the first end to end digital System of Agreement
430,000 Customers – 350 Million users – 1 Million documents/day
High Performance Architecture at DocuSign
3
1.1 M+
transactions
per day
100s of Gbps
of network
bandwidth
6,000+
Blob trx/sec
150TB+
of PCI flash storage
powering our
OLTP system
Thousands
of drives, tens
of PBs of storage
4.5K+ HTTP
requests/sec
>99.99%
uptime
Platform Security is Core to our Mission
4
Hardware &
Infrastructure
• Geo-dispersed data
centers
• Near real-time data
replication
• Round-the-clock security
Systems &
Operations
• Separate corporate,
development and
production networks
• Active 24/7 monitoring and
alerting
• Data stored up to nine
times across
geographically disparate
locations
Applications
& Access
• Customer control over
account authentication
options
• Multiple recipient
authentication options
• Layers of auditing,
including digital audit trails
and logging capabilities
Transmission
& Storage
• Anti-tampering controls on
documents
• Reliable, systematic
capture of signing data
• Cloud and on-premises
solutions
Why did we choose
Black Duck?
DocuSign Complies With the Top Security and Privacy
Standards
Global Security
Gold Standard:
Full ISO
27001:2013
Standardized
approach to
security
assessment,
authorization, and
continuous
monitoring for cloud
products and
services
First company to be
compliant with
xDTM Standard,
v.1.0, standard
focused on quality
for Digital
Transaction
Management
DocuSign adheres
to the requirements
of the European
Union’s General
Data Protection
Regulation (GDPR)
SOC 1 Type 2:
Audit report on
controls relevant to
financial reporting,
verifies operating
effectiveness
SOC 2 Type 2:
Audit report covers
security, availability,
processing integrity,
confidentiality
Data Security
Standard for
handling credit card
information.
DocuSign
compliant as both
service provider
and merchant
Approved
DocuSign Binding
Corporate Rules
(BCR) as a data
Controller and
Processor,
sponsored by the
Irish Data
Protection
Commissioner
Goals of using Black Duck at DocuSign
1. Detect and understand the open source risks in our portfolio:
ü Create an inventory that is accurate
ü Auto-generate DocuSign’s quarterly compliance evidence
ü Map paths to engineering owners and drop offline PDF risk reports for all teams
ü File tickets for vulnerable components
ü Analyze xGPL usage for arm’s-length implementation
ü Build notice/attribution pages with © , Warranty Disclaimers and license terms
ü Dump entire dataset to SQL and create Power BI dashboards
ü Publish a legal agreement whitelist and implement a scalable agreement matrix.
2. Improve the DocuSign component authorization process and templates
ü Integrate AppSec reviews with regular development cycles
ü Reduce signers by 30%
ü Detect unapproved components
ü Implement threat model pre-scanning with Black Duck risk reports
Top Challenges and
Metrics
Top 10 Challenges of OSS Governance
1) Creating accurate reports of what is actually shipping in a complex
dev environment.
2) Implementing a Patching Policy without disrupting new features
3) Compiled binaries in GitHub. Arg!
4) 10 year old code is still in the system - POC / Dead Code / Unshipped
repos
5) Some GitHub code not actually shipping, or team ships from a sub
branch
6) Identifying ownership and non-ownership
7) Integrating with Sonarcube, Fortify, Nessus scanning to augment
results.
8) AGPL converted to commercial – Still detected as AGPL
9) Refreshing all data while persisting exceptions, ignores and license
updates.
Releases and Compliance: From Manual to Real-Time
Metrics
Unique components detected: 4527
Code under management: 500 repositories and 80,000 OSS files.
BlackDuck Flags: 2,400
After 6 months of remediation: 150 – all classified low risk due to use
Patch compliance: New versions for 1500 components
Jenkins build scanning: 6 builds in daily scan
Artifactory: 400 Artifacts scanned weekly
Licenses in use: 120 – 95% permissive
Attributions: 300 components – 17 downloadable
products
Legal Guidance and
Evidence
Open Source Legal Guidance
Production Authorization Envelopes for Open Source:
Create immutable envelopes using the DocuSign API
PowerBI Reports
Power BI reporting with dynamic filtering
• Team/User/Component
views
• Exec reporting
• Phone formatted
Prepping the Data -- Python 3 – Pandas and SQL
Alchemy
20 Lines of code to
import all reports into
SQL!
Live Demo? Or Memorex…
Projects and Tools
Automate the creation of compliance evidence:
BlackDuck, Jenkins, Github, SonarCube, Artifactory and DocuSign
• Automatically sync and scan code bases, builds and release artifacts
• Annotate risks for developers in SonarCube and Artifactory
• Create DocuSign embedded component authorization forms for AppSec + architecture leads
• Auto-generate DocuSign envelopes for quarterly authorization signoffs for each project
• Build quarterly inventory for compliance evidence with signoff from VP and deputy risk
managers
• SQL Import jobs to automatically link ownership with binaries and produce Power BI reports
• Scan every PR for new components and follow up with developers and teams.
• AI?
In-progress Aspirations: API Mashups!
Security = Trust
Regular Assessment Activities
Activity Cadence Requirement Scope
Vulnerability Scanning Monthly ISO/PCI/FedRamp, Customer All DocuSign systems
ASV Scanning Quarterly PCI PCI Scope
Release Scanning Monthly ISO/PCI/FedRamp, Customer Primary Products
Go Live Scanning On Demand ISO/PCI/FedRamp New dynamic web sites
Website Scan On Demand ISO/PCI/FedRamp All DocuSign web sites
Website Malware and
Change Monitoring
Daily ISO/PCI/FedRamp All DocuSign web sites
Server Acceptance On Demand ISO/PCI/FedRamp New DocuSign systems
Pentest Annual PCI/ISO/FedRamp PCI Scope
3rd Party Security Tooling
Product Area Scope
BlackDuck Hub Open source vulnerabilities, licenses,
operational risks, patch levels and
attribution.
Open Source in Github,
Compiled apps, Jenkins,
Artifactory
Tenable Security Center and
Nessus Scanners
Network and OS vulnerability scanning All DocuSign systems
Rapid 7 AppSpider / Arachni Web application and release scanning /
Dynamic Analysis
Primary Products / New
dynamic websites
Risk IQ Web application inventory management All DocuSign websites
HP Fortify Static code analysis Primary Products
Burp Suite Dynamic application scanning and
penetration testing tool
Primary Products / PenTests
Delivering World-Class Security
Platform and Architecture Overview2
• Security strategy
• Security policies
• Security council
• SDLC security
• Threat &
Vulnerability mgmt
• Information
assurance
Governance,
Risk, and
Compliance
Endpoint
Security
• Security tools
architecture
• Intel security suite
• Data leakage
prevention
• Malware protection
Monitoring,
Defense,
and Incident
Response
• 24/7 security ops
center
• Correlation ranking
and escalation of
security events
Managed
Services
• Vendor security life-
cycle compliance
program
Physical
Security
• Data centers
& offices
• People security
& safety
• Badging
• Cameras
• Sign-in process
World-
Class
Security
Program
Processes
The DocuSign Security Program
3
Delivering World-Class Security
People
• Comprehensive cross-functional security
expertise
• Industry thought leadership
• Extensive security and privacy training
Platform and Operations
• Customer control over account authentication
options
• Multiple recipient authentication options
• Layers of auditing and logging capabilities
People
Platform
Processes
• Expansive, holistic protection program with
incident response, endpoint security,
physical security, privacy and compliance
• Internationally recognized security standards
and certifications
Thanks!
Feel free to reach out:
Scott.johnson@docusign.com

Weitere ähnliche Inhalte

Was ist angesagt?

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourceBlack Duck by Synopsys
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Black Duck by Synopsys
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceBlack Duck by Synopsys
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudBlack Duck by Synopsys
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsBlack Duck by Synopsys
 
Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Reuven Harrison
 
Securing deployment pipeline
Securing deployment pipelineSecuring deployment pipeline
Securing deployment pipelineLen Bass
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabUC2
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 

Was ist angesagt? (20)

Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
Application Security Logging with Splunk using Java
Application Security Logging with Splunk using JavaApplication Security Logging with Splunk using Java
Application Security Logging with Splunk using Java
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Securing Docker Containers
Securing Docker ContainersSecuring Docker Containers
Securing Docker Containers
 
Integrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIsIntegrating Black Duck into Your Environment with Hub APIs
Integrating Black Duck into Your Environment with Hub APIs
 
Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?Are your DevOps and Security teams friends or foes?
Are your DevOps and Security teams friends or foes?
 
Securing deployment pipeline
Securing deployment pipelineSecuring deployment pipeline
Securing deployment pipeline
 
Рабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC LabРабочие нагрузки Skype for business 2015 UC Lab
Рабочие нагрузки Skype for business 2015 UC Lab
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 

Ähnlich wie Flight East 2018 Presentation–Black Duck at Docusign

Spring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel Lavoie
Spring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel LavoieSpring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel Lavoie
Spring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel LavoieVMware Tanzu
 
SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...
SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...
SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...VMware Tanzu
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
Kube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor appsKube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor appsShikha Srivastava
 
DevOps Powered by Splunk
DevOps Powered by SplunkDevOps Powered by Splunk
DevOps Powered by SplunkSplunk
 
Leveraging Analytics for DevOps
Leveraging Analytics for DevOpsLeveraging Analytics for DevOps
Leveraging Analytics for DevOpsMichael Floyd
 
Spring and Pivotal Application Service - SpringOne Tour - Boston
Spring and Pivotal Application Service - SpringOne Tour - BostonSpring and Pivotal Application Service - SpringOne Tour - Boston
Spring and Pivotal Application Service - SpringOne Tour - BostonVMware Tanzu
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasSpring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasVMware Tanzu
 
15-factor-apps.pdf
15-factor-apps.pdf15-factor-apps.pdf
15-factor-apps.pdfNilesh Gule
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Securityguest2a5a03
 
CI and CD with Spinnaker
CI and CD with SpinnakerCI and CD with Spinnaker
CI and CD with SpinnakerVMware Tanzu
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointIvanti
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAmazon Web Services
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015John Haggins
 
Modernizing Testing as Apps Re-Architect
Modernizing Testing as Apps Re-ArchitectModernizing Testing as Apps Re-Architect
Modernizing Testing as Apps Re-ArchitectDevOps.com
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingAarno Aukia
 

Ähnlich wie Flight East 2018 Presentation–Black Duck at Docusign (20)

2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Spring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel Lavoie
Spring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel LavoieSpring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel Lavoie
Spring Boot & Spring Cloud Apps on Pivotal Application Service - Daniel Lavoie
 
SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...
SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...
SpringOne Tour Denver - Spring Boot & Spring Cloud on Pivotal Application Ser...
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
Kube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor appsKube con china_2019_7 missing factors for your production-quality 12-factor apps
Kube con china_2019_7 missing factors for your production-quality 12-factor apps
 
DevOps Powered by Splunk
DevOps Powered by SplunkDevOps Powered by Splunk
DevOps Powered by Splunk
 
Leveraging Analytics for DevOps
Leveraging Analytics for DevOpsLeveraging Analytics for DevOps
Leveraging Analytics for DevOps
 
Spring and Pivotal Application Service - SpringOne Tour - Boston
Spring and Pivotal Application Service - SpringOne Tour - BostonSpring and Pivotal Application Service - SpringOne Tour - Boston
Spring and Pivotal Application Service - SpringOne Tour - Boston
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasSpring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour Dallas
 
Modern application development with heroku
Modern application development with herokuModern application development with heroku
Modern application development with heroku
 
15-factor-apps.pdf
15-factor-apps.pdf15-factor-apps.pdf
15-factor-apps.pdf
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
CI and CD with Spinnaker
CI and CD with SpinnakerCI and CD with Spinnaker
CI and CD with Spinnaker
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015
 
Modernizing Testing as Apps Re-Architect
Modernizing Testing as Apps Re-ArchitectModernizing Testing as Apps Re-Architect
Modernizing Testing as Apps Re-Architect
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
Badusha_Profile
Badusha_ProfileBadusha_Profile
Badusha_Profile
 
Resume
ResumeResume
Resume
 

Mehr von Synopsys Software Integrity Group

Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Synopsys Software Integrity Group
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Synopsys Software Integrity Group
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileSynopsys Software Integrity Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 

Mehr von Synopsys Software Integrity Group (20)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What? Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–You've Got Your Open Source Audit Report–Now What?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 

Kürzlich hochgeladen

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 

Kürzlich hochgeladen (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 

Flight East 2018 Presentation–Black Duck at Docusign

  • 1. Black Duck @ DocuSign Scott M. Johnson Lead PM – Technical Compliance How DocuSign uses BlackDuck for Devops, AppSec and Compliance
  • 2. DocuSign is now a verb The industry leader in signing is now building the first end to end digital System of Agreement
  • 3. 430,000 Customers – 350 Million users – 1 Million documents/day High Performance Architecture at DocuSign 3 1.1 M+ transactions per day 100s of Gbps of network bandwidth 6,000+ Blob trx/sec 150TB+ of PCI flash storage powering our OLTP system Thousands of drives, tens of PBs of storage 4.5K+ HTTP requests/sec >99.99% uptime
  • 4. Platform Security is Core to our Mission 4 Hardware & Infrastructure • Geo-dispersed data centers • Near real-time data replication • Round-the-clock security Systems & Operations • Separate corporate, development and production networks • Active 24/7 monitoring and alerting • Data stored up to nine times across geographically disparate locations Applications & Access • Customer control over account authentication options • Multiple recipient authentication options • Layers of auditing, including digital audit trails and logging capabilities Transmission & Storage • Anti-tampering controls on documents • Reliable, systematic capture of signing data • Cloud and on-premises solutions
  • 5.
  • 6. Why did we choose Black Duck?
  • 7. DocuSign Complies With the Top Security and Privacy Standards Global Security Gold Standard: Full ISO 27001:2013 Standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services First company to be compliant with xDTM Standard, v.1.0, standard focused on quality for Digital Transaction Management DocuSign adheres to the requirements of the European Union’s General Data Protection Regulation (GDPR) SOC 1 Type 2: Audit report on controls relevant to financial reporting, verifies operating effectiveness SOC 2 Type 2: Audit report covers security, availability, processing integrity, confidentiality Data Security Standard for handling credit card information. DocuSign compliant as both service provider and merchant Approved DocuSign Binding Corporate Rules (BCR) as a data Controller and Processor, sponsored by the Irish Data Protection Commissioner
  • 8. Goals of using Black Duck at DocuSign 1. Detect and understand the open source risks in our portfolio: ü Create an inventory that is accurate ü Auto-generate DocuSign’s quarterly compliance evidence ü Map paths to engineering owners and drop offline PDF risk reports for all teams ü File tickets for vulnerable components ü Analyze xGPL usage for arm’s-length implementation ü Build notice/attribution pages with © , Warranty Disclaimers and license terms ü Dump entire dataset to SQL and create Power BI dashboards ü Publish a legal agreement whitelist and implement a scalable agreement matrix. 2. Improve the DocuSign component authorization process and templates ü Integrate AppSec reviews with regular development cycles ü Reduce signers by 30% ü Detect unapproved components ü Implement threat model pre-scanning with Black Duck risk reports
  • 10. Top 10 Challenges of OSS Governance 1) Creating accurate reports of what is actually shipping in a complex dev environment. 2) Implementing a Patching Policy without disrupting new features 3) Compiled binaries in GitHub. Arg! 4) 10 year old code is still in the system - POC / Dead Code / Unshipped repos 5) Some GitHub code not actually shipping, or team ships from a sub branch 6) Identifying ownership and non-ownership 7) Integrating with Sonarcube, Fortify, Nessus scanning to augment results. 8) AGPL converted to commercial – Still detected as AGPL 9) Refreshing all data while persisting exceptions, ignores and license updates.
  • 11. Releases and Compliance: From Manual to Real-Time
  • 12.
  • 13.
  • 14. Metrics Unique components detected: 4527 Code under management: 500 repositories and 80,000 OSS files. BlackDuck Flags: 2,400 After 6 months of remediation: 150 – all classified low risk due to use Patch compliance: New versions for 1500 components Jenkins build scanning: 6 builds in daily scan Artifactory: 400 Artifacts scanned weekly Licenses in use: 120 – 95% permissive Attributions: 300 components – 17 downloadable products
  • 16. Open Source Legal Guidance
  • 18. Create immutable envelopes using the DocuSign API
  • 20. Power BI reporting with dynamic filtering • Team/User/Component views • Exec reporting • Phone formatted
  • 21. Prepping the Data -- Python 3 – Pandas and SQL Alchemy 20 Lines of code to import all reports into SQL!
  • 22. Live Demo? Or Memorex…
  • 24. Automate the creation of compliance evidence: BlackDuck, Jenkins, Github, SonarCube, Artifactory and DocuSign • Automatically sync and scan code bases, builds and release artifacts • Annotate risks for developers in SonarCube and Artifactory • Create DocuSign embedded component authorization forms for AppSec + architecture leads • Auto-generate DocuSign envelopes for quarterly authorization signoffs for each project • Build quarterly inventory for compliance evidence with signoff from VP and deputy risk managers • SQL Import jobs to automatically link ownership with binaries and produce Power BI reports • Scan every PR for new components and follow up with developers and teams. • AI? In-progress Aspirations: API Mashups!
  • 26.
  • 27. Regular Assessment Activities Activity Cadence Requirement Scope Vulnerability Scanning Monthly ISO/PCI/FedRamp, Customer All DocuSign systems ASV Scanning Quarterly PCI PCI Scope Release Scanning Monthly ISO/PCI/FedRamp, Customer Primary Products Go Live Scanning On Demand ISO/PCI/FedRamp New dynamic web sites Website Scan On Demand ISO/PCI/FedRamp All DocuSign web sites Website Malware and Change Monitoring Daily ISO/PCI/FedRamp All DocuSign web sites Server Acceptance On Demand ISO/PCI/FedRamp New DocuSign systems Pentest Annual PCI/ISO/FedRamp PCI Scope
  • 28. 3rd Party Security Tooling Product Area Scope BlackDuck Hub Open source vulnerabilities, licenses, operational risks, patch levels and attribution. Open Source in Github, Compiled apps, Jenkins, Artifactory Tenable Security Center and Nessus Scanners Network and OS vulnerability scanning All DocuSign systems Rapid 7 AppSpider / Arachni Web application and release scanning / Dynamic Analysis Primary Products / New dynamic websites Risk IQ Web application inventory management All DocuSign websites HP Fortify Static code analysis Primary Products Burp Suite Dynamic application scanning and penetration testing tool Primary Products / PenTests
  • 29. Delivering World-Class Security Platform and Architecture Overview2 • Security strategy • Security policies • Security council • SDLC security • Threat & Vulnerability mgmt • Information assurance Governance, Risk, and Compliance Endpoint Security • Security tools architecture • Intel security suite • Data leakage prevention • Malware protection Monitoring, Defense, and Incident Response • 24/7 security ops center • Correlation ranking and escalation of security events Managed Services • Vendor security life- cycle compliance program Physical Security • Data centers & offices • People security & safety • Badging • Cameras • Sign-in process World- Class Security Program
  • 30. Processes The DocuSign Security Program 3 Delivering World-Class Security People • Comprehensive cross-functional security expertise • Industry thought leadership • Extensive security and privacy training Platform and Operations • Customer control over account authentication options • Multiple recipient authentication options • Layers of auditing and logging capabilities People Platform Processes • Expansive, holistic protection program with incident response, endpoint security, physical security, privacy and compliance • Internationally recognized security standards and certifications
  • 31. Thanks! Feel free to reach out: Scott.johnson@docusign.com