DevSecOps : The Open Source Way by Yusuf Hadiwinata
Jakarta, 26 September 2018
DevSecOps: The Open Source Way
DevOps Community in Indonesia
By Yusuf Hadiwinata Sutandar
DEVOPS INDONESIA HOUSE RULES
TAKE NOTES, NOT CALLS
RECEIVE KNOWLEDGE, NOT MESSAGES
MUTE NOTIFICATIONS FOR SLACK QQ WHATSAPP IMESSAGE EMAIL
TELEGRAM SNAPCHAT FACEBOOK WEIBO HANGOUTS VOXER SIGNAL G+
TWITTER VIBER SKYPE WECHAT LINE SMS ...
Let’s get know each otherLet's get know each other
Linux Geek | OpenSource Enthusiast | Security Hobbies
Yusuf Hadiwinata Sutandar
Managing risk in a volatile DevOps world
Raise You Hand!
...has heard of Docker?
...knows what Docker is?
...has tried Docker?
...uses Docker in production?
...with additional tools?
...or even implement DevSecOps?
Or maybe SecDevSecOpsSec?
● DevOps “purists” point out that security was always
part of DevOps
● Did people just not read the book? Are practitioners
● DevSecOps practitioners say it’s about how to
continuously integrate and automate security at
● Protecting private User-data/Company daya
● Restricting access
● Standar Compliance
GLASS HALF EMPTY, GLASS HALF FULL
“... we estimate that fewer than 20% of enterprise security architects have
engaged with their DevOps initiatives to actively and systematically incorporate
information security into their DevOps initiatives; and fewer still have achieved the
high degrees of security automation required to qualify as
“By 2019, more than 70% of enterprise DevOps initiatives will have
incorporated automated security vulnerability and configuration scanning for
open source components and commercial packages, up from less than 10% in 2016.”
DevSecOps: How to Seemlessly Integrate Security Into DevOps, Gartner Inc. September 2016
Security is seen as an inhibitor to DevOps
Security infrastructure has lagged in its ability
to become ‘software defined’ and
programmable, making it difficult to
Modern applications are largely ‘assembled,’
not developed, and developers often download
and use known vulnerable open-source
components and frameworks
Applications are ‘assembled’...
...utilizing billions of available libraries,
frameworks and utilities
● Not all are created equal, some are healthy and
some are not
● All go bad over time, they age like milk, not like
● Data shows enterprises consumed an average
229,000 software components annually, of which
17,000 had a known security vulnerability
THE PERFECT STORM
● Open Source Software
● innovation explosion
● Digital transformation
YOU MANAGE RISK BY
● Securing the Assets/Infra
● Securing the Dev
● Securing the Ops
● Securing the APIs
SECURING THE ASSETS
● Building code
● Watching for changes in how things get built
● Signing the builds
● Built assets
● Scripts, binaries, packages (RPMs),
● (OCI images), machine images (ISOs, etc.)
● Registries (Service, Container, App)
● Repositories (Local on host images assets)
SECURING THE SOFTWARE ASSETS - E.G. IMAGE REGISTRY
● Public and private registries
● Do you require a private registry?
● What security meta-data is available for your images?
● Are the images in the registry updated regularly?
● Are there access controls on the registry? How strong are they?
● Who can push images to the registry?
SECURING THE ASSETS
HEALTH - Security freshness
● Freshness Grade for container security.
● Monitor image registry to automatically replace affected images
● Use policies to gate what can be deployed: e.g. if a container requires
root access, prevent deployment
SECURING THE DEVELOPMENT PROCESS
● Potentially lots of parallel builds
● Source code
● Where is it coming from?
● Who is it coming from?
● Supply Chain Tooling
● CI tools (e.g. Jenkins)
● Testing tools
● Scanning Tools (e.g. Black Duck,
SECURING THE OPERATIONS
▪ Trusted registries and repos
▪ Signature authenticating and
▪ Image scanning
▪ Ongoing assessment with automated
SECURING THE OPERATIONS
● Blue Green or A/B or Canary, continuous deployments
● Monitoring deployments
● Possibly multiple environments
Modern Architectures are API driven requiring a DevOps approach to API
management, Visibility, routing, and authorization are key security concerns.
Plan - Thread Modeling Tools
OWASP Threat Dragon Project
Threat Dragon is a free, open-source threat modeling tool
from OWASP. It can be used as a standalone desktop app for
Windows and MacOS (Linux coming soon) or as a web
The desktop app is great if you want to try the application
without giving it access to your GitHub repos, but if you
choose the online version you get to unleash the awesome
power of GitHub on your threat models! Obviously, to do
this you need to log in first..
Docker Host Security Compliance
Security Automation for Containers and VMs with OpenSCAP
SCAP is a set of specifications related to security automation. SCAP is used to improve
security posture - hardening and finding vulnerabilities—as well as regulatory reasons
API-aware Networking and Security
Cilium brings API-aware network security
filtering to Linux container frameworks like
Docker and Kubernetes. Using a new Linux
kernel technology called BPF, Cilium provides a
simple and efficient way to define and enforce
both network-layer and application-layer
security policies based on container/pod
Secure container-aware credentials storage, trust management.
HashiCorp Vault secures, stores, and tightly
controls access to tokens, passwords,
certificates, API keys, and other secrets in
modern computing. Vault handles leasing, key
revocation, key rolling, and auditing. Through a
unified API, users can access an encrypted
Key/Value store and network encryption-as-a-
service, or generate AWS IAM/STS credentials,
SQL/NoSQL databases, X.509 certificates, SSH
credentials, and more.
Static source-code analysis / static application security testing (SAST)
Brakeman - Rails Security Scanner
Static analysis security scanner for Ruby on Rail
Static source-code analysis / static application security
SonarQube is an open source platform
developed by SonarSource for continuous
inspection of code quality to perform
automatic reviews with static analysis of code
to detect bugs, code smells, and security
vulnerabilities on 20+ programming languages
Integrate the image scanning into Jenkins pipelines with clairctl
Clairctl is a lightweight command-line tool doing the bridge between Registries as
Docker Hub, Docker Registry or Quay.io, and the CoreOS vulnerability tracker,
Clair. Clairctl will play as reverse proxy for authentication.
Jenkins CI Image Vulnerability Scan
Static Application Security Testing (SAST)
Clair: The Container Image Security Analyzer
Clair is an open source project for the static analysis of vulnerabilities in
application containers (currently including appc and docker).
Dynamic Application Security Testing (DAST)
OWASP Zed Attack Proxy Project
is one of the world’s most popular free security tools and is actively maintained by
hundreds of international volunteers*. It can help you automatically find security
vulnerabilities in your web applications while you are developing and testing your
applications. Its also a great tool for experienced pentesters to use for manual security
Dynamic Application Security Testing (DAST)
Free, Simple, Distributed, Intelligent, Powerful,
Arachni is a feature-full, modular, high-
performance Ruby framework aimed towards
helping penetration testers and administrators
evaluate the security of modern web
Mobile Application Security Testing (MAST)
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application
(Android/iOS/Windows) pen-testing framework capable of performing static, dynamic
and malware analysis. It can be used for effective and fast security analysis of Android,
iOS and Windows mobile applications and support both binaries (APK, IPA & APPX ) and
zipped source code. MobSF can do dynamic application testing at runtime for Android
apps and has Web API fuzzing capabilities powered by CapFuzz, a Web API specific
security scanner. MobSF is designed to make your CI/CD or DevSecOps pipeline
Managed Ecosystem for Secure Operations
SIMP is an Open Source, fully automated, and extensively tested
framework that can either enhance your existing infrastructure or allow
you to quickly build one from scratch. Built on the mature Puppet
product suite, SIMP is designed around scalability, flexibility, and
Container Security Framework
NIST Special Publication 800-190: Application Container Security Guide
Access Control; Configuration Management; System and Communications
Protection; System and Information Integrity; Audit and Accountability;
Awareness and Training; Identification and Authentication; Incident
Response; Risk Assessment;
BRINGING IT ALL TOGETHER
Continues learning DevSecOps concepts
OWASP DevSecOps Studio Project DevSecOps Studio is one of its kind, self
contained DevSecOps environment/distribution to help individuals in learning
DevSecOps concepts. It takes lots of efforts to setup the environment for
training/demos and more often, its error prone when done manually.
● Easy to setup environment with just one command “vagrant up”
● Teaches Security as Code, Compliance as Code, Infrastructure as Code
● With built-in support for CI/CD pipeline
● OS hardening using ansible
● Compliance as code using Inspec
● QA security using ZAP, BDD-Security and Gauntlt
● Static tools like bandit, brakeman, windbags, gitrob, gitsecrets
● Security Monitoring using ELK stack.
● Git server to store code and infrastructure (as code).
● CI/CD pipeline to embed security as part CI/CD like SAST, DAST, hardening, compliance etc.,
● Add Security tools as jobs.
● Analyze and fix the issues found.
Are You Awesome?
We are Hiring !
Alone We are smart, together We are brilliant
THANK YOU !
Quote by Steve
Parece que tem um bloqueador de anúncios ativo. Ao listar o SlideShare no seu bloqueador de anúncios, está a apoiar a nossa comunidade de criadores de conteúdo.
Atualizámos a nossa política de privacidade.
Atualizámos a nossa política de privacidade de modo a estarmos em conformidade com os regulamentos de privacidade em constante mutação a nível mundial e para lhe fornecer uma visão sobre as formas limitadas de utilização dos seus dados.
Pode ler os detalhes abaixo. Ao aceitar, está a concordar com a política de privacidade atualizada.