Slide 1

Slide 1 text

Put yourself in the #appsec pipeline

Slide 2

Slide 2 text

Change your Yahoo Password now (ymail, flickr, …)! http://www.usatoday.com/story/tech/2016/09/22/report-yahoo-may- confirm-massive-data-breach/90824934/

Slide 3

Slide 3 text

$ whoami • Application security engineer 15 years in #appsec industry • Tech blogger @codiceinsicuro • Love writing security source code scanners (Owasp Orizon, dawnscanner) • Love talking about application security • #appsec tweets available at @thesp0nge

Slide 4

Slide 4 text

Agenda • Talk about testing scenarios • Talk about what an appsec pipe is and what do you need to create one • Be inspired, go home and do some homework

Slide 5

Slide 5 text

What do I have to test?

Slide 6

Slide 6 text

No content

Slide 7

Slide 7 text

Testing scenarios

Slide 8

Slide 8 text

We don’t do any test (and we are aware of it)

Slide 9

Slide 9 text

We don’t do any test (but I’ll love to do)

Slide 10

Slide 10 text

We do security test (but I want to learn more about the pipeline)

Slide 11

Slide 11 text

How do we perform security tests?

Slide 12

Slide 12 text

The unacceptable solution… • Tests must be done: • in production environment • before going live • Testers need: • the code being frozen • some “fake” accounts • a couple of week to do the job

Slide 13

Slide 13 text

… for a difficult task • Products can not delay time to market release to allow security tests • Tests must be performed on each release • Often companies do releases on a weekly basis • There are no fake accounts on a production server • Code is never on a frozen state • This applies to web properties and mobile applications • Tests are not sawn as investment

Slide 14

Slide 14 text

#appsec can’t be done this way and we’re the first talking our science to the next level

Slide 15

Slide 15 text

The application security pipeline

Slide 16

Slide 16 text

Before we start • We need • Commitment • An organised SDLC • A development team aware about #appsec topic • An #appsec team (with patience and some coding skills)

Slide 17

Slide 17 text

Then we can build the #appsec pipeline (https://www.owasp.org/index.php/OWASP_AppSec_Pipeline)

Slide 18

Slide 18 text

The collector tool A way for our customer to ask for services, keep track about the progress and having results back

Slide 19

Slide 19 text

Your favourite collection of #appsec tools You may want to cover vulnerability assessment, penetration test, web application penetration test and code review at least. Keep calm and let’s go shopping.

Slide 20

Slide 20 text

The Orchestrator Your customers ask for services, you need an automatic dispatcher mechanism to the appropriate tool. Of course you need also something retrieving results too.

Slide 21

Slide 21 text

The ticketing system You need something to keep track about vulnerabilities, about their history and their state.

Slide 22

Slide 22 text

The Workflow (Glue all together)

Slide 23

Slide 23 text

Bonus track - some useful tools

Slide 24

Slide 24 text

Some tools to check • Sinatra with Grape (create HTTP API endpoints) • Owasp ZAP (WAPT on steroids) • Owasp DeepViolet (check your SSL config) • Nexpose + nexpose gem (automate vulnerability assessment) • Brakeman/Dawnscanner (ultimate ruby code review) • Owasp Orizon (Java security code review) • Owasp GLUE gem (pipeline related tool)

Slide 25

Slide 25 text

THANKS!