Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Security scanning overview
Search
Sponsored
·
SiteGround - Reliable hosting with speed, security, and support you can count on.
→
tetiana chupryna
February 16, 2019
Programming
1
99
Security scanning overview
We’ll talk about different types of vulnerabilities, scanning tools and the whole process per se.
tetiana chupryna
February 16, 2019
Tweet
Share
More Decks by tetiana chupryna
See All by tetiana chupryna
GitLab, Journey In Time
brytannia
0
27
Security Scanning with GitLab
brytannia
0
57
Время Ruby
brytannia
0
120
Microservice communication with RabbitMQ
brytannia
0
95
Язык программирования за 5 мучительных минут
brytannia
0
95
Если у вас в руках молоток
brytannia
1
190
Continuous delivery with Codeship
brytannia
0
80
Neo4j a bit of math and magic
brytannia
0
78
Other Decks in Programming
See All in Programming
コントリビューターによるDenoのすゝめ / Deno Recommendations by a Contributor
petamoriken
0
200
開発者から情シスまで - 多様なユーザー層に届けるAPI提供戦略 / Postman API Night Okinawa 2026 Winter
tasshi
0
200
高速開発のためのコード整理術
sutetotanuki
1
400
AIフル活用時代だからこそ学んでおきたい働き方の心得
shinoyu
0
130
QAフローを最適化し、品質水準を満たしながらリリースまでの期間を最短化する #RSGT2026
shibayu36
2
4.4k
Basic Architectures
denyspoltorak
0
670
責任感のあるCloudWatchアラームを設計しよう
akihisaikeda
3
170
AIで開発はどれくらい加速したのか?AIエージェントによるコード生成を、現場の評価と研究開発の評価の両面からdeep diveしてみる
daisuketakeda
1
2.4k
AI前提で考えるiOSアプリのモダナイズ設計
yuukiw00w
0
230
OCaml 5でモダンな並列プログラミングを Enjoyしよう!
haochenx
0
140
疑似コードによるプロンプト記述、どのくらい正確に実行される?
kokuyouwind
0
380
フルサイクルエンジニアリングをAI Agentで全自動化したい 〜構想と現在地〜
kamina_zzz
0
400
Featured
See All Featured
BBQ
matthewcrist
89
10k
Ruling the World: When Life Gets Gamed
codingconduct
0
140
Fashionably flexible responsive web design (full day workshop)
malarkey
408
66k
How to Align SEO within the Product Triangle To Get Buy-In & Support - #RIMC
aleyda
1
1.4k
The Psychology of Web Performance [Beyond Tellerrand 2023]
tammyeverts
49
3.3k
Jess Joyce - The Pitfalls of Following Frameworks
techseoconnect
PRO
1
64
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
31
3.1k
Become a Pro
speakerdeck
PRO
31
5.8k
A Tale of Four Properties
chriscoyier
162
24k
Thoughts on Productivity
jonyablonski
74
5k
Leo the Paperboy
mayatellez
4
1.4k
Optimising Largest Contentful Paint
csswizardry
37
3.6k
Transcript
Security Scanning Overview Tetiana Chupryna Feb 16 2018 Kyiv
Te(a)ti(y)ana
GitLab Te(a)ti(y)ana
GitLab Secure Te(a)ti(y)ana
GitLab Secure dogs Te(a)ti(y)ana
None
Security Scanning
Application Security Security Scanning
Information Security Application Security Security Scanning
None
Application security • Defend assets • Search vulnerabilities • Prevent
attacks • Disarm treats
a story
Alice
Alice
Alice Bob
Alice Bob Trudy
Alice Bob Trudy
Alice Bob Walter
Common Weakness Enumeration (CWE) • Common language for describing software
security weaknesses • Standard measuring stick for software security tools • Common baseline standard for weakness identification, mitigation, and prevention efforts
Common Vulnerabilities and Exposures (CVE) • List of known vulnerabilities
inside products • Widely used by many services
Vulnerability • What? (Identifier, Name, Description) • Where? (Location) •
How critical? (Severity) • How confident? (Confidence)
Level 1 Your code is a problem
SAST • Static Application Security Testing • Testing from inside
out (white-box) • Technology dependent
Tools (owasp.org) • Brakeman - Rails • Codesake Dawn -
Ruby (~)
DAST • Dynamic Application Security Testing • Testing from outside
(black box) • Live attack on staging • HTTP - lingua-franca
ZAProxy • OWASP Zed Attack Proxy Project • Open source
What else? • Secrets detection • Interactive Application Security Testing
(IAST) • Fuzzing
Top 10 Rails vulnerabilities • Failure to Restrict URL Access
• Preventing SQLi in Ruby • Cross-Site Scripting (XSS) • Injection • Cross-Site Request Forgery (CSRF) • Insecure Cryptographic Storage • Broken Authentication and Session Management • Invalidated Redirects and Forwards • Insecure Direct Object References • Insufficient Transport Layer Protection • Security Misconfiguration
Level 2 Other’s code is a problem
Dependency Scanning • Software Composition Analysis • Tricky one
Alice Bob Trudy Heidi
“Given enough eyeballs, all bugs are shallow.” –Linus Torvalds
ShellShock existed in the OpenSSL library for more than 22
years
Tools • OWASP Dependency-Check • Gemnasium (part of GitLab) •
snyk.io
Level 3 It’s not about code anymore
Container scanning • Scanning Docker images for known vulnerabilities •
cause there are dependencies as well
Tools • Clair • Docker Trusted Registry
None
Alice Bob Trudy Walter
None
DevOpsSec
Do I need it?
No
Yes
What we do in GitLab? • One tool to rule
them all. • Insert secure tools into DevOps cycle. • Tool to help Security Analysts. • Auto-remediate functionality.
Security Dashboard
Use with pipeline sast: image: docker:stable variables: DOCKER_DRIVER: overlay2 allow_failure:
true services: - docker:stable-dind script: - export SP_VERSION=$(echo "$CI_SERVER_VERSION" | sed 's/^\([0-9]*\)\.\([0-9]*\).*/\1-\2-stable/') - docker run --env SAST_CONFIDENCE_LEVEL="${SAST_CONFIDENCE_LEVEL:-3}" --volume "$PWD:/code" --volume /var/run/docker.sock:/var/run/docker.sock "registry.gitlab.com/gitlab-org/security-products/sast:$SP_VERSION" /app/bin/run /code artifacts: reports: sast: gl-sast-report.json
Available features • SAST • DAST • Dependency Scanning •
Container Scanning • License Management • … and more!
Stay safe!
Photo Credits • @bichon_frise_ally • @hongeunyeong • @arang2o_o • @tofupuppers
Security Scanning Overview