Veracode / CA Developing a Security Culture in the Agile / DevOps Accelerated Development Environment This PowerPoint Template includes a series of.

Slides:



Advertisements
Similar presentations
Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012.
Advertisements

HP Quality Center Overview.
OpenMake Dynamic DevOps
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Roadmap to Continuous Integration Testing and Benefits Gowri Selka, Walgreens Natalie Koltun, Walgreens May 20th, 2014 ©2013 Walgreen Co. All rights reserved.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
A Framework for Automated Web Application Security Evaluation
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Confidential Continuous Integration Framework (CIF) 5/18/2004.
Deconstructing API Security
Optimal Pipeline Using Perforce, Jenkins & Puppet Nitin Pathak Works on
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Parasoft : Improving Productivity in IT Organizations David McCaw.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
© 2013 IBM Corporation Accelerating Product and Service Innovation Service Virtualization Testing in Managed Environments Michael Elder, IBM Senior Technical.
Checkmarx choose what developers use. About us o Founded in 2006 o Enterprise Grade Static and Interactive Application Security Testing Solutions o Hundreds.
FROM CONTINUOUS INTEGRATION TO VIRTUAL PATCHING BUILDING APPSEC ALL ALONG THE WEB APPLICATION LIFECYCLE.
© 2011 IBM Corporation ® Managing Decision services in WebSphere Message Broker using WebSphere ILOG JRules. Amar Shah Mallanagouda Patil December 2011.
Structured Container Delivery Oscar Renalias Accenture Container Lead (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)
Copyright © 2016, Cigital So you’ve purchased a SAST tool? Brenton Kohler Copyright © 2016, Cigital.
SAST is MUST About Me Moni (Moshe) many years in IT totally ignorant of risk posed by code. Checkmarx director of sales for.
We Optimize. You Capitalize Software Development Services
Don’t Forget Security When Delivering Software
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Continuous Delivery- Complete Guide
Partner Toolbox Cloud Infrastructure & Management
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Microsoft Azure-Powered BlueCielo Meridian360 Portal Improves Asset Data Integrity and Facilitates Secure Collaboration with External Stakeholders MICROSOFT.
World Wide Web policy.
Владимир Гусаров Директор R&D, Dell Visual Studio ALM MVP ALM Ranger
7/2/2018 2:39 AM BRK2413 Customer lifecycle with LCS: Dynamics 365 for Finance and Operations, Enterprise edition Manali Dongre Senior Program Manager.
Your Chance to Get It Right Five Keys to Building AppSec into DevOps
Platform as a Service.
Microsoft SharePoint Server 2016
Speaker’s Name, SAP Month 00, 2017
Veeam Backup Repository
Week 01 Comp 7780 – Class Overview.
Virtualization & Security real solutions
Azure Primed Randy Pagels Sr. Developer Technology Specialist
OpenNebula Offers an Enterprise-Ready, Fully Open Management Solution for Private and Public Clouds – Try It Easily with an Azure Marketplace Sandbox MICROSOFT.
SYSTEMART, LLC We Optimize. You Capitalize Software Application Development
Tailor slide to customer industry/pain points
Automate Early... But Securely!
Advantages OF BDD Testing
PowerONE Secure Information On-Demand Delivering…
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
The analyst view: Gartner
Simplified Development Toolkit
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Automated Testing and Integration with CI Tool
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
AppExchange Security Certification
Herding Cats and Security Tools
Quality Assurance in an Agile Development Team Michelle Wu 2018 PNSQC
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Single Cell’s Progenitor Powered by Microsoft Azure Improves Organisational Efficiency with Strategic Procurement, Contract Management, and Analytics MICROSOFT.
Last.Backend is a Continuous Delivery Platform for Developers and Dev Teams, Allowing Them to Manage and Deploy Applications Easier and Faster MICROSOFT.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Desktop App Assure Service Microsoft Representative Name June 7, 2019
Office 365 Development July 2014.
ONAP Architecture Principle Review
Introducing MagicInfo 6
Presentation transcript:

Veracode / CA Developing a Security Culture in the Agile / DevOps Accelerated Development Environment This PowerPoint Template includes a series of slide masters with predefined layouts and color schemes for formatting slides Slide Masters are displayed when you right click on a slide and select Layout from menu September 2017 Joost de Jong

Veracode in Broad Strokes: About Veracode Veracode in Broad Strokes: Headquartered in Boston, USA Founded in 2006, Division of CA Europe HQ in London UK 550 Staff, 350 Engineers Dedicated and focused on Application Security Testing Mantra: Leading the way towards the integration of security in all phases of the software development life cycle (DevSecOps)

The analyst view: Gartner Description Veracode is a well-established global AST provider with a strong presence in the North American market as well as presence in the European market. Veracode's offering includes SAST, DAST and SCA cloud services, as well as IAST (and RASP). In the last 12 months, Veracode launched Greenlight, a SAST service to be used early on in the development process by integrating into the IDE to scan an individual class or file. In addition to Greenlight, Veracode provides the Developer Sandbox, which can statically scan an application or component and measure results without impacting or penalizing developer metrics. Veracode focused some of its recent efforts on extending its language and framework support, as well as SDLC integration, and most recently it announced a single instrumentation agent to provide IAST and RASP capabilities. Veracode will meet the requirements of organizations looking for a broad set of AST services and that want support for their AST and SCA from a third-party expert with a comprehensive AST solution.

CA / Veracode Key Objectives: + Enable Agile / DevSecOps + Set Corporate Policy: Both Internal & External Development + Enable Agile / DevSecOps

DevSecOps It is not just a question of purchasing the right tools Engaged Stakeholders + Development + Security / Risk + Management + Consumers

Automate & Integrate Throughout App Lifecycle Build or Buy Test Operate Code Commit Build Test Release Deploy Operate Agile DevOps CI/CD Continuous Testing & Integration Continuous Scanning & Protection Security Assurance Veracode Web Application Scanning (WAS) Dynamic Analysis (DAST) Greenlight Veracode Static Analysis (SAST) Veracode Runtime Protection (RASP) eLearn Veracode Software Composition Analysis Veracode APIs for Custom Integrations IDEs Build Tools CI/CD Systems Bug Tracking GRCs SIEMs WAFs

A Lifecycle Approach Reduces Cost, Risk $15.4 million *Verizon Breach Report, 2015 Cost to Remediate Develop QA Operate $ Application Lifecycle Exploit

Static Analysis for all development stages Enterprise 9 Import 8 Policy Scan 7 Build Greenlight Scan 3 Early Dev 2 Sandbox Scan(s) 5 Mid to late Dev 4 Veracode Application Security Platform User stories Features / Defects Personal Team 1 Develop 6 Check In 5 & 8 = 1x App Profile / License (<50mb) – unlimited scanning Automated 3 = Developer User License(s) – unlimited scanning Veracode Plugin

Managing Vulnerabilities over Time Start Measuring Apply Policy eLearning Control # Vulnerabilities over time # vulnerabilities # time

Centralized Administration & Performance Tracking

Applying Policy to Development Specific to Application Compliance Requirement: PCI, OWASP, SANS, CERT, or specific to regulatory environment Consolidated 1st Party Code + 3Rd Party Modules scan Frequency of Scanning Remediation Times according to Severity of Vulnerability Security: Accept/Deny: False Positives

Veracode Static Analysis Efficient Licensing/Collaboration App Profile (1x Veracode Annual Subscription) Policy Scan (used by Security Team for assurance and compliance reporting) Sandbox 1 – E.g. Aggregated App Promote to Policy Scan Sandbox: Provides private scanning area for development teams Does not impact Compliance of application Typically integrated into CI/Build Server and performed nightly/weekly Developers can identify and resolve policy violating flaws prior to performing a Policy Scan For Multi-Tier / Multi-Team Applications, Sandbox is used to enable independent scanning per team – aligning to pace of team(s) and eliminating over-reporting flaws A Sandbox can be promoted to become a Policy Scan Important – No Governance and/or Compliance reporting on individual Sandboxes within an App Profile (if this is needed, a separate App Profile and License is needed) With Sandboxes, you benefit from having up to 5 concurrent scans running under a single App Profile Unlimited access to all automation/integration options per Sandbox, and unlimited user access Sandbox 2 – E.g. Java Sandbox 3 – E.g. .Net Sandbox 4 – E.g. Backend Sandbox n -

Greenlight: Security Testing Who is it for? Developers seeking the fast, frequent security testing, early in the Development lifecycle. What is it? Allows Developers to discover security-related defects before committing code, so they can fix security flaws before they change context, all from within their IDE. How does it work? Scanning code snippets, files, classes or whole projects are initiated from the IDE with results delivered back to the IDE in seconds. Defects are found and fixed before code is ever checked in.

Greenlight: Testing Architecture

SCA: Why scan 3rd party code? Input Uploaded Application Including 3rd-party components in the analysis increases accuracy. Most developers use standardized sanitization functions in 3rd party components rather than writing their own. Excluding 3rd party code therefore hurts accuracy. Example: A tainted input value is sanitized using a function in a 3rd-party component. If Veracode omitted the 3rd-party component in the analysis, the solution would show up as a false positive. Tip: Solutions that analyze source code rather than binaries cannot scan compiled 3rd-party components and therefore have a higher false positive rate. Many companies don’t have ready access to source code, even when components are open source, increasing their false positive rate. 1st Party Code 3rd Party Component Sanitization Data Flow Output 3rd Party Component Images & Videos Unused 3rd Party Component Included in Analysis Size Not included in Analysis Size

SCA:Report Flaws in 3rd Party Code? Input Uploaded Application We typically do not recommend reporting on flaws in 3rd party code using Veracode Static Analysis. Most customers can’t or don’t want to fix vulnerabilities in 3rd-party code by changing the code themselves. Therefore, they don’t want to muddy their reports (and policy results) with these vulnerabilities. Tip: Use Veracode Software Composition Analysis (SCA) to find publicly known vulnerabilities in 3rd-party components. Veracode SCA will also tell you if there is a newer version of the component that fixes the vulnerability. 1st Party Code 3rd Party Component Data Flow Output 3rd Party Component Images & Videos Unused 3rd Party Component Report flaws found in code Do not report flaws

DAST: Dynamic Scanning Test any web application with as little as a URL Easy to get started Simple, intuitive workflow Scalable – run multiple scans in parallel Multiple authentication schemes Scans can start immediately or in the future Behind the firewall scanning for internal apps

DAST: Testing Capabilities Veracode developed dynamic scanning technology Support for the latest Web 2.0 technology JavaScript, AJAX and Flash object analysis supported Designed to scale in production or behind-the-firewall Testing Capabilities Cross-site scripting SQL injection “Blind” SQL injection SQL Injection auth bypass CSRF Backup file detection Cross-site trace Information leakage Session fixation CRLF injection OS Command Injection SSL Certificate issues SSL Strength Analysis Improper authentication Browsable directory Sensitive files & paths Remote File Inclusion Clickjacking HTTP only and Secure cookie flags Shellshock

DAST: Continuous Integration 3 Scan from the Veracode Cloud or Virtual Scan Appliance Dynamic Scan APIs Configure scans Schedule scans Fetch detailed results Immediately initiate Dynamic Scans via the Dynamic Rescan API Builds deployed to QA environment 1 2 Build Test Automated results integration 4

Regulatory Documentation Compliance Reporting Regulatory Documentation

AppSec Program: Phases Onboarding Definition Execution Optimization Initial Communication Assessments Remediation Application Portfolio Program Oversight Integrations Reporting & Analytics

Thank You This PowerPoint Template includes a series of slide masters with predefined layouts and color schemes for formatting slides Slide Masters are displayed when you right click on a slide and select Layout from menu