The Importance of DevSecOps

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Breaking Trust On The Internet
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Introduction Our Topic: Mobile Security Why is mobile security important?
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
PART THREE E-commerce in Action Norton University E-commerce in Action.
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Topic 5: Basic Security.
CERN IT Department CH-1211 Genève 23 Switzerland t Security Overview Luca Canali, CERN Distributed Database Operations Workshop April
Systems Development Life Cycle: Mean Motocross Machines By: Cortney Robertson Paul Garcia.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Computer Security By Duncan Hall.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
SQL INJECTION Diwakar Kumar Dinkar M.Tech, CS&E Roll Diwakar Kumar Dinkar M.Tech, CS&E Roll
AP CSP: Identifying People with Data and The Cost of Free
Securing Information Systems
Interset Support Overview March 2017
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Continuous Delivery- Complete Guide
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
TOPIC: Web Security (Part-4)
Security Testing Methods
Common Methods Used to Commit Computer Crimes
Protecting What’s Yours: Your Identity
Information Security.
^ About the.
E-commerce Application Security
Lecture 14: Business Information Systems - ICT Security
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Joe, Larry, Josh, Susan, Mary, & Ken
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Forensics Week 11.
Today’s Risk. Today’s Solutions. Cyber security and
Data Security Team 1.
Call AVG Antivirus Support | Fix Your PC
Robert Leonard Information Security Manager Hamilton
Nessus Vulnerability Scanning
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Unit 1.6 Systems security Lesson 2
Network Security Best Practices
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Lecture 2 - SQL Injection
Computer Security.
Protecting Your Company’s Most Valuable Asset
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Topic 5: Communication and the Internet
Mastercard® Threat scan
Las Positas College Flex Day
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Company Name | Phone Number | Website | Address
Mastercard® Threat scan
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

The Importance of DevSecOps By: Katia Gomes

Why is security important? Generic Login Basic SQL Injection select Password from Users where UserName='$user' and Password='$password’ select Password from Users where UserName=‘’ or ‘’=‘' and Password=‘’ or ‘’=‘’ The query will return true – valid user To demonstrate why security is such a big topic, let’s go through a basic example I created at http://students.cs.niu.edu/~z1730089/honors/. It is a basic login connected to a database of users and their password. It works as you would accept, allowing a login with correct credentials and failing otherwise. However, with some simple SQL Injection, a malicious user could fake a successful login, gaining access to data they shouldn’t have.

OWASP Top 10 Application Security Risks - 2017 Injection (such as SQL, NoSQL, OS, LDAP) Untrusted data is sent to an interpreter and executed Broken Authentication Incorrect implementation of authentication and session management Sensitive Data Exposure Sensitive data is not properly protected Open Web Application Security Project Injection Untrusted data is sent to an interpreter and is executed, allowing a malicious user to access data without proper authorization (like my example) Broken Authentication Authentication and session management are incorrectly implemented, allowing attackers to compromise passwords, keys or session tokens. They can then assume other users’ identities temporarily or permanently Sensitive Data Exposure Sensitive data such as financial or healthcare are not properly protected. Attackers can steal or modify such data to conduct credit card fraud, identity theft, or other crimes.

Data Breaches Biggest 2018 Yahoo Adult Friend Finder eBay Equifax 2013 – 3 billion accounts Adult Friend Finder 2016 – 400+ million accounts eBay 2014 – 145 million users Equifax 2017 – 143 million consumers Best Buy – April 5 Sears – April 4 Delta – April 4 Saks Fifth Ave/Lord & Taylor – April 1 Under Armour – March 29 Hack Sponsored by Iran – March 23 FedEx – Februrary 15 There have also been many data breaches over the years These are the top 4, by number of records stolen: Yahoo 3 billion user accounts, including users names, email addresses, dates of birth and passwords Adult Friend Finder 400+ million accounts including names, email addresses and passwords (encryption easily cracked) eBay 145 million accounts, including names, addresses, dates of birth and encrypted passwords. The hackers got in via credentials of 3 corporate employees Equifax 143 million consumers, including SSN, birth dates, addresses plus potentially drivers’ license numbers and credit card data They are one of the largest credit bureaus in the U.S. In 2018 alone, these companies have been hacked and user information, typically including customer information and even payment information Specifically, an Iranian hacker ring hacked into computer networks of 144 U.S. universities and sent a phishing scan, breaching the email accounts of roughly 4,000 professors. This resulted in 31 terabytes of data stolen, totaling $3.4 billion worth of damages.

As a whole, data breaches are on the rise And those are just a few examples of the number of data breaches that have occurred. As a whole, data breaches have been on the rise. Now, how can we go about reducing the number of data breaches? Of course, we need to make applications more secure. But how would a company go about doing that?

DevSecOps What is it? Weaves security into DevOps What is DevOps? Development, Security and Operations Weaves security into DevOps What is DevOps? This is where the concept DevSecOps comes into play. It stands for Development, Security and Operations. This is basically a guideline for how to weave security into DevOps – a practice companies have already started using. In order to fully understand DevSecOps, we need to make sure we understand DevOps.

DevOps – Before Security Restructures app lifecycle Core Principles: Collaboration and communication Agility towards change Software design Failing fast and early Innovation and continuous learning Automating processes and tools However, cycle lacks security Basically, DevOps restructures the traditional application lifecycle. It weaves together Development and Operations to create flexibility in the application. It outlines a set of guidelines to implement through tools, technology and process. The core principles are … DevOps encourages faster delivery, defect resolutions and creates an overall collaborative environment. However, this process fails to include security.

DevSecOps DevOps with Security Shift security to the left Once again restructures app lifecycle Shift security to the left DevSecOps is, simply put, DevOps with security baked into it. It once again restructures the application lifecycle to make it so that security is something considered at every stage. The goal is to shift security to the left of the development cycle, adding security checks after each development phase.

So What? Build in security Automation Faster introduction of defects Faster fixes So what? By shifting security to the left of the development cycle, it ensures that security is thoroughly built into the application. Security checks after each phase add a level of automation. It also allows developers to notice potential vulnerabilities faster. And, one of the most important things, in my opinion, is that it allows for faster response times to vulnerabilities found in the live software.

Integration Developers need to learn security Add security checks for each small code release Use tools to both monitor and identify security issues Clearly this concept is something beneficial for companies to use, but with any new methodology, a company would need to figure out how to implement it into their work flow. With DevSecOps, this means changing the development process from start to finish so that it incorporates security. So, first off developers need to learn about security.

Jenkins Automation software Assists in continuous integration Tests code every time it is updated in repository Helps ensure that there are no code defects One very helpful software companies can use is called Jenkins. It is a software that can help with automation. Specifically, it is used to assist with continuous integration. With DevSecOps, there should be frequent releases. This means there will be daily code changes and merging with repositories. If code is not tested frequently, it could lead to a pile of defect by the time it is. Jenkins assists with automatically testing code when it is integrated, helping to ensure that the code contains no defects.

Nessus Vulnerability scanner Assists with finding vulnerabilities within software Scans software for security defects hackers could exploit Ensures that there are minimal security defects Another useful software is called Nessus. It is a vulnerability scanner software. It scans the application and will search for security defects that a hacker could exploit. Nessus alerts the developer of these defects, ordering them by severity. Then these potential exploits can be fixed before the software is released, leading to less vulnerabilities in the deployed code.

Metasploit Penetration testing framework Assists with finding vulnerabilities within software Attacks software like a potential hacker would Ensures that there are minimal security defects Another tool used for fining security defects is Metasploit. Specifically, Metasploit is used for penetration testing. This is where the company has a person test their application to see if there are any security vulnerabilities in the software. They are trying to see if they can find a way to break through the security of the software. So, Metasploit allows the tester to facilitate the attacks hacker run. This way different types of security vulnerabilities can be tested. This ability to run penetration tests on the software adds another way to make sure that an application doesn’t have any security defects.

Splunk Monitoring software Assists with monitoring deployed software for security threats Analyses and identifies anomalous behavior Alters developer about potentially malicious attacks One more very useful tool for companies to use is Splunk. This is a monitoring software that identifies potentially malicious attacks on the application. This application makes it very easy to not only identify malicious attacks, but automating the incident response procedures. This leads to faster response times to vulnerabilities.

Final Thoughts Obviously, security is important DevSecOps offers the framework to bake security into an application There are already many tools available With all of that said, here are a few final thoughts. Obviously, security is important for the fact that technology is constantly being developed and it is only being released faster. Given how many security breaches there have been, the need for secure applications is only increasing. So, thoughts of security need to be generated towards to the start of development. DevSecOps is a framework with the goal to bake security into an application. It makes it so that security is everyone's responsibility, not just the security team. And there are already many tools available to assist with the integration of DevSecOps. Though it seems like a simple concept, it is something that will help increase the overall application security and would help prevent data breaches.