Upgrade to Pro — share decks privately, control downloads, hide ads and more …

DevSecOps Bootcamp - Week 2 - Lesson 2

DevSecOps Bootcamp - Week 2 - Lesson 2

This is the second lesson of the DevSecOps bootcamp to describe the basics of building a bad/weak app.

DevSecOps

June 02, 2016
Tweet

More Decks by DevSecOps

Other Decks in Technology

Transcript

  1. 1 DevSecOps Bootcamp BUILDING RUGGED SOFTWARE YEAR ONE / WEEK

    TWO / LESSON TWO Copyright © DevSecOps Foundation 2015-2016
  2. 2 Copyright © DevSecOps Foundation 2015-2016 • Github makes copy

    paste easy • It also makes it easy to paste in vulnerabilities • Have you ever included a library without looking at it? • https://github.com/rubysec/ruby- advisory-db Code ”Sharing”
  3. 3 Copyright © DevSecOps Foundation 2015-2016 • Trusting the User

    • Not Validating Input • Hardcoding Secrets • Trusting code without validating it • Adding secrets to SCM (gitrob) • What’s your favorite? Bad Coding Practices
  4. 4 Copyright © DevSecOps Foundation 2015-2016 • Faster iterations can

    mean faster introduction of defects. • Deployments now include infrastructure. • Deployments now include application configurations. • Anyone ever use Jenkins? • BUT -> Faster iterations can mean faster fixes. Intersection with DevOps Font Awesome by Dave Gandy - http://fortawesome.github.com/Font-Awesome [CC BY-SA 3.0], via Wikimedia Commons
  5. 5 Copyright © DevSecOps Foundation 2015-2016 • Better fewer suppliers

    • Humans can’t move fast enough • Automation is a must • Be careful about selecting your dependencies • The new hotness is not necessarily the most secure option Software Supply Chain
  6. 6 Copyright © DevSecOps Foundation 2015-2016 • Code Injection •

    Broken Authentication and Session Management • Cross Site Scripting • Insecure Direct Object References • Security Misconfiguration • Sensitive Data Exposure • Missing Function Level Access Control • Cross Site Request Forgery • Using Components with Known Vulnerabilities • Unvalidated Redirects and Forwards Top 10
  7. 8 Copyright © DevSecOps Foundation 2015-2016 • You will be

    deploying the web app that you wrote this week to an AWS free tier account. • There are vulnerabilities in this application so be Careful! • Do not deploy this application to a cloud provider unless you know how to lock down access to only your remote IP! Lab 3 - Deploying Vulnerable App