Upgrade to Pro — share decks privately, control downloads, hide ads and more …

DevOpsDays Cuba 2016: Ignite - Security Testing for Web Apps using OSS

DevOpsDays Cuba 2016: Ignite - Security Testing for Web Apps using OSS

Author: Marialina Ballesteros Hernández
Summary:
Importancia de los Test de seguridad y su utilización en la integración continua. Utilización de la herramienta brakeman para chequear vulnerabilidades de seguridad en el código fuente de proyectos de Ruby. Experiencias con las herramientas Arachni y Zaproxy para “pentesting” automatizado y manual respectivamente.

DevOpsDays Cuba

October 20, 2016
Tweet

More Decks by DevOpsDays Cuba

Other Decks in Technology

Transcript

  1. Security & DevOps • Should be involved earlier in development

    • Should balance the audit/security needs for faster deployments.
  2. Security & DevOps • Should be involved earlier in development

    • Should balance the audit/security needs for faster deployments. • Security, Development, Ops and Testing should be aligned.
  3. “Penetration testing [is] defined as a legal and authorized attempt

    to locate and successfully exploit computer systems for the purpose of making those systems more secure.” Patrick Engebretson The Basics of Hacking and Penetration Testing
  4. Standard phases for pentesting: Pre-engagement Interactions Intelligence Gathering Threat Modeling

    Vulnerability Analysis Exploitation Post Exploitation Reporting
  5. Test scenarios at Web App PenTesting: Cross Site Scripting SQL

    Injection Broken authentication and session management File Upload flaws Caching Servers Attacks Security Misconfigurations Cross Site Request Forgery Password Cracking
  6. Develop Code Commit Source Control Build Trigger Tests Deploy to

    Production Deploy to Test Env Report & Notify Publish to release repository Automatic security test SCA Test Security within Continuous Deployment Manual security test
  7. Web App Security Testing • Identifying unknown vulnerabilities. • Checking

    the effectiveness of the security policies. • Finding the loopholes which can lead to theft of sensitive data.