SlideShare a Scribd company logo
1 of 32
Download to read offline
Utsav Sanghani, Senior Product Manager, Synopsys
Anna Chiang, Senior Product Marketing Manager, Synopsys
DevSecOps and Application Security Best Practices
Guide to Application Security: What to Look For and Why
© 2020 Synopsys, Inc. 2
Digital transformation of enterprises
© 2020 Synopsys, Inc. 3
Organizations are becoming software companies
© 2020 Synopsys, Inc. 4
The need for speed, time to market, business agility
© 2020 Synopsys, Inc. 5
Security is increasingly more important
of all cyber attacks happen
on the application layer.
84%
“When it comes to breaches, though,
web application security remains the
area of greatest risk.”*
* Kacy Zurkus, Web Application Security Poses Greatest Risk, Infosecurity, Feb. 19, 2019.
© 2020 Synopsys, Inc. 6
Ways to speed up software development
Sec
© 2020 Synopsys, Inc. 7
By 2021, DevSecOps practices will be
embedded in 60% of rapid development
teams, as opposed to 20% in 2019.*
* Neil MacDonald and Dale Gardner, 12 Things to Get Right for Successful DevSecOps,
Gartner, Dec. 19, 2019.
Sec
Higher
speed
Reduced
friction
Continuous
feedback
Lower
cost
$
Integrating security into DevOps: DevSecOps
© 2020 Synopsys, Inc. 8
Cloud computing is increasingly a vehicle for next-
generation digital business, as well as agile, scalable and
elastic solutions.*
Cloud computing: Accelerating change in business trajectory
* David Mitchell Smith, vice president and Gartner Fellow, in Kasey Panetta, Cloud Computing Enters Its Second Decade, Gartner, Jan. 30, 2017.
†
Frank Della Rosa, Worldwide Cloud 2019 Predictions, IDC, Nov. 27, 2018.
By 2021, more than half of global enterprises already using
cloud today will adopt an all-in cloud strategy.*
By 2021, 70% of new enterprise applications will be
developed cloud native.†
© 2020 Synopsys, Inc. 9
Enterprise development requirements
“Perfect and invulnerable applications are not possible; therefore, security and risk management
leaders must balance the need for security with development’s need for speed.”*
Development Security
* Neil MacDonald and Mark Horvath, Integrating Security Into the DevSecOps Toolchain, Gartner, Nov. 15, 2019.
© 2020 Synopsys, Inc. 10
Which security tools fit where in the SDLC
Pre-
Commit
Commit Build Test Deploy Production
IDE Tools / SCM
SAST
SCA
IAST
DAST
© 2020 Synopsys, Inc. 11
Best practices: Shift left
• Automated security testing can catch defects right on the developers’ desktops before they
ever check their code back in to the main codebase
• Waiting to catch things until later in the test phases is far more expensive
© 2020 Synopsys, Inc. 12
What to look for in an application security tool
Development tool integrations
© 2020 Synopsys, Inc. 13
What to look for in an AppSec SaaS platform
• Ease of use, speed,
accuracy
• Fast incremental analysis
• Security training and
remediation advice
• Consistent user experience
• Open source management
• Cross-correlation of results
• Integrations for
development environments,
tools, and cloud platforms
• Scalability
• Identification of high-risk
security vulnerabilities
• Ability to ensure policy
compliance
• Comprehensive reporting
Development DevOps Security
© 2020 Synopsys, Inc. 14
The Polaris Software Integrity Platform
Central Server
Build & Test Environment
Integrated Analysis Engines
Centralized
Management
Consolidated
Reporting
Alerting &
Workflow
CI/CD & DevOps
Integration
SaaS/Private Cloud
Deployment
Coverity Black Duck
Seeker
Defensics
Managed
Services
Code Sight
Developer Environment
Integrated Local +
Central Analysis
IDE Plugin
IntelliJ, Eclipse, Visual Studio
Context-Sensitive
eLearning
Coverity Black Duck
Seeker
Defensics
Managed
Services
© 2020 Synopsys, Inc. 15
Polaris Centralized Analysis
Gives security and engineering teams a comprehensive view of software security and
quality risks
z
Cloud ready
Integrated cross-product UX
Enterprise ready—SSO, RBAC
Fast, in-the-cloud analysis
Integrated cross-product reporting
© 2020 Synopsys, Inc. 16
Coverity on Polaris: Focus on the most important issues
© 2020 Synopsys, Inc. 17
Coverity on Polaris: Flexible reporting features
Filter and group by section of source code Focus on OWASP Top 10 2017
© 2020 Synopsys, Inc. 18
Coverity on Polaris: Issue details and triage options
Code snippet
with call
graph
Issue triage &
audit log
Severity type
& tool type
© 2020 Synopsys, Inc. 19
Single view of overall risk: Coverity, Black Duck, Seeker, MSP
• Out-of-the-box OWASP Top 10 2017, 2013 reports
• Risk assessment score of 0–100 across all products
© 2020 Synopsys, Inc. 20
Web
Browser
Polaris
Reporting
Agents
Polaris
CLI
3rd Party
API client
TLS/HTTPS
Code
Sight
Polaris deployment models
Flexibility in how Polaris components are deployed
Reporting
Services
Analysis Engines
GCS
Storage
CloudSQL
Database
Core Platform Services
Common
Object
Taxonomy
Service
Triage &
Query
Issue
Service
Tool Domain Services
Coverity Black Duck
Kubernetes
Seeker Defensics
API / Ingress
Control
Synopsys’ Google Cloud
Reporting
Services
Analysis Engines
K8S PVC
Storage
Postgres
Database
Core Platform Services
Common
Object
Taxonomy
Service
Triage &
Query
Issue
Service
Tool Domain Services
Coverity Black Duck
Kubernetes
Seeker Defensics
API / Ingress
Control
Customer Hosted
SaaS model
– Synopsys hosted
– Get up and running quickly
– Always use the latest version
Customer hosted
– Deploy on your own Kubernetes-
based systems
– Provision resources to your needs
– Load balance based on your needs
© 2020 Synopsys, Inc. 21
Polaris Code Sight IDE-based analysis for Coverity
Helps developers find and fix security and quality flaws as they code without leaving the IDE
Support for all MAJOR IDEs
Fast, just-in-time analysis on the desktop
Context-sensitive guidance and education
Native to the IDE & developer-friendly interface
© 2020 Synopsys, Inc. 22
Coverity with Code Sight
Fast, accurate, automated best-in-class analysis
• Just-in-time high-fidelity incremental analysis
serves up analysis results in seconds
• Runs automatically in the background and
regularly syncs with full baseline analysis
• Uses the same comprehensive
Coverity engine as full baseline analysis
does, for consistent, accurate results
© 2020 Synopsys, Inc. 23
Coverity with Code Sight
Crisp issues view
Prioritized vulnerabilities
by category
Dataflow view: main
and supporting events
Triage and dismiss
vulnerabilities
Link to CWE
description
© 2020 Synopsys, Inc. 24
Coverity with Code Sight
Integrated with eLearning
for contextual learning
courses
© 2020 Synopsys, Inc. 25
Course outline page
• Bite-sized chunks
• Animated walk-throughs
• Case studies of real-world exploits
• All types of learning content: video,
code snippets, etc.
• Knowledge checks at the end of each
lesson
• Assessment section at the end of the
course; pass with 80% or higher to
complete the course
© 2020 Synopsys, Inc. 26
© 2020 Synopsys, Inc. 27
Polaris platform integrations support
© 2020 Synopsys, Inc. 28
How Synopsys products fit into the SDLC
© 2020 Synopsys, Inc. 29
What is Black Duck Radar?
• Native Chrome browser plugin to help identify
FOSS components before they are downloaded
• Allows you to shift further left than the IDE
• Supports multiple repositories, such as Maven Central,
NPM, RubyGems, NuGet, PyPI, CocoaPods
• Shows security vulnerabilities and potential
policy violations
© 2020 Synopsys, Inc. 30
Synopsys Software Integrity Group
• Synopsys continues to invest heavily in Software Integrity tools and services
• Coverity SAST
– Find and fix security and quality defects as you code
• Black Duck SCA
– Secure and manage open source in apps and containers
• Seeker IAST
– Automate security and data protection testing in CI pipelines
• Defensics Fuzzing
– Detect protocol vulnerabilities in IoT and embedded devices
• Security Testing, Training, and Consulting Services
– Scale your AppSec programs with on-demand expertise
Best-in-class AppSec tools and services (Forrester Wave for SAST and SCA, Gartner
Magic Quadrant)
© 2020 Synopsys, Inc. 31
DevSecOps and AppSec best practices
• Shift left with security testing
• Security tools need to:
– Seamlessly integrate with existing development tools / DevOps workflows for CI/CD
– Meet the needs of development, DevOps, and security teams
– Offer a broad portfolio of testing tools and services (SAST, SCA, IAST, DAST) for each stage of SDLC
– Provide a central view of critical vulnerabilities in a scalable cloud platform
• Completely invulnerable apps aren’t possible
• Companies need to be able to quickly identify the highest risks to their organizations and
balance security needs with business agility
Key takeaways to ensure high-quality and secure apps
Thank You

More Related Content

What's hot

Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsSynopsys Software Integrity Group
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Synopsys Software Integrity Group
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Software Integrity Group
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Software Integrity Group
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsSynopsys Software Integrity Group
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Black Duck by Synopsys
 

What's hot (19)

Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical AppsWebinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–Mobile Application Hardening Protecting Business Critical Apps
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016Open Source Outlook: Expected Developments for 2016
Open Source Outlook: Expected Developments for 2016
 

Similar to Webinar–That is Not How This Works

Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptxArthur528009
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisCarlos Andrés García
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisVMware Tanzu
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationSynopsys Software Integrity Group
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program DevOps.com
 
Unlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analyticsUnlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analyticssource{d}
 
Enterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinarEnterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinarJohn Mathon
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
Security that Scales with Cloud Native Development
Security that Scales with Cloud Native DevelopmentSecurity that Scales with Cloud Native Development
Security that Scales with Cloud Native DevelopmentPanoptica
 
2022: 6 Cloud-Native App Development Trends to Transform Your Business
2022: 6 Cloud-Native App Development Trends to Transform Your Business2022: 6 Cloud-Native App Development Trends to Transform Your Business
2022: 6 Cloud-Native App Development Trends to Transform Your BusinessWeCode Inc
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdfNextbrain
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?Codit
 

Similar to Webinar–That is Not How This Works (20)

Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service Practical Guide to Platform-as-a-Service
Practical Guide to Platform-as-a-Service
 
Unlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analyticsUnlocking Engineering Observability with advanced IT analytics
Unlocking Engineering Observability with advanced IT analytics
 
Enterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinarEnterprise platform 3.0v4 for webinar
Enterprise platform 3.0v4 for webinar
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Security that Scales with Cloud Native Development
Security that Scales with Cloud Native DevelopmentSecurity that Scales with Cloud Native Development
Security that Scales with Cloud Native Development
 
2022: 6 Cloud-Native App Development Trends to Transform Your Business
2022: 6 Cloud-Native App Development Trends to Transform Your Business2022: 6 Cloud-Native App Development Trends to Transform Your Business
2022: 6 Cloud-Native App Development Trends to Transform Your Business
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?
 

More from Synopsys Software Integrity Group

More from Synopsys Software Integrity Group (10)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Webinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript ApplicationsWebinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript Applications
 

Recently uploaded

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 

Recently uploaded (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 

Webinar–That is Not How This Works

  • 1. Utsav Sanghani, Senior Product Manager, Synopsys Anna Chiang, Senior Product Marketing Manager, Synopsys DevSecOps and Application Security Best Practices Guide to Application Security: What to Look For and Why
  • 2. © 2020 Synopsys, Inc. 2 Digital transformation of enterprises
  • 3. © 2020 Synopsys, Inc. 3 Organizations are becoming software companies
  • 4. © 2020 Synopsys, Inc. 4 The need for speed, time to market, business agility
  • 5. © 2020 Synopsys, Inc. 5 Security is increasingly more important of all cyber attacks happen on the application layer. 84% “When it comes to breaches, though, web application security remains the area of greatest risk.”* * Kacy Zurkus, Web Application Security Poses Greatest Risk, Infosecurity, Feb. 19, 2019.
  • 6. © 2020 Synopsys, Inc. 6 Ways to speed up software development Sec
  • 7. © 2020 Synopsys, Inc. 7 By 2021, DevSecOps practices will be embedded in 60% of rapid development teams, as opposed to 20% in 2019.* * Neil MacDonald and Dale Gardner, 12 Things to Get Right for Successful DevSecOps, Gartner, Dec. 19, 2019. Sec Higher speed Reduced friction Continuous feedback Lower cost $ Integrating security into DevOps: DevSecOps
  • 8. © 2020 Synopsys, Inc. 8 Cloud computing is increasingly a vehicle for next- generation digital business, as well as agile, scalable and elastic solutions.* Cloud computing: Accelerating change in business trajectory * David Mitchell Smith, vice president and Gartner Fellow, in Kasey Panetta, Cloud Computing Enters Its Second Decade, Gartner, Jan. 30, 2017. † Frank Della Rosa, Worldwide Cloud 2019 Predictions, IDC, Nov. 27, 2018. By 2021, more than half of global enterprises already using cloud today will adopt an all-in cloud strategy.* By 2021, 70% of new enterprise applications will be developed cloud native.†
  • 9. © 2020 Synopsys, Inc. 9 Enterprise development requirements “Perfect and invulnerable applications are not possible; therefore, security and risk management leaders must balance the need for security with development’s need for speed.”* Development Security * Neil MacDonald and Mark Horvath, Integrating Security Into the DevSecOps Toolchain, Gartner, Nov. 15, 2019.
  • 10. © 2020 Synopsys, Inc. 10 Which security tools fit where in the SDLC Pre- Commit Commit Build Test Deploy Production IDE Tools / SCM SAST SCA IAST DAST
  • 11. © 2020 Synopsys, Inc. 11 Best practices: Shift left • Automated security testing can catch defects right on the developers’ desktops before they ever check their code back in to the main codebase • Waiting to catch things until later in the test phases is far more expensive
  • 12. © 2020 Synopsys, Inc. 12 What to look for in an application security tool Development tool integrations
  • 13. © 2020 Synopsys, Inc. 13 What to look for in an AppSec SaaS platform • Ease of use, speed, accuracy • Fast incremental analysis • Security training and remediation advice • Consistent user experience • Open source management • Cross-correlation of results • Integrations for development environments, tools, and cloud platforms • Scalability • Identification of high-risk security vulnerabilities • Ability to ensure policy compliance • Comprehensive reporting Development DevOps Security
  • 14. © 2020 Synopsys, Inc. 14 The Polaris Software Integrity Platform Central Server Build & Test Environment Integrated Analysis Engines Centralized Management Consolidated Reporting Alerting & Workflow CI/CD & DevOps Integration SaaS/Private Cloud Deployment Coverity Black Duck Seeker Defensics Managed Services Code Sight Developer Environment Integrated Local + Central Analysis IDE Plugin IntelliJ, Eclipse, Visual Studio Context-Sensitive eLearning Coverity Black Duck Seeker Defensics Managed Services
  • 15. © 2020 Synopsys, Inc. 15 Polaris Centralized Analysis Gives security and engineering teams a comprehensive view of software security and quality risks z Cloud ready Integrated cross-product UX Enterprise ready—SSO, RBAC Fast, in-the-cloud analysis Integrated cross-product reporting
  • 16. © 2020 Synopsys, Inc. 16 Coverity on Polaris: Focus on the most important issues
  • 17. © 2020 Synopsys, Inc. 17 Coverity on Polaris: Flexible reporting features Filter and group by section of source code Focus on OWASP Top 10 2017
  • 18. © 2020 Synopsys, Inc. 18 Coverity on Polaris: Issue details and triage options Code snippet with call graph Issue triage & audit log Severity type & tool type
  • 19. © 2020 Synopsys, Inc. 19 Single view of overall risk: Coverity, Black Duck, Seeker, MSP • Out-of-the-box OWASP Top 10 2017, 2013 reports • Risk assessment score of 0–100 across all products
  • 20. © 2020 Synopsys, Inc. 20 Web Browser Polaris Reporting Agents Polaris CLI 3rd Party API client TLS/HTTPS Code Sight Polaris deployment models Flexibility in how Polaris components are deployed Reporting Services Analysis Engines GCS Storage CloudSQL Database Core Platform Services Common Object Taxonomy Service Triage & Query Issue Service Tool Domain Services Coverity Black Duck Kubernetes Seeker Defensics API / Ingress Control Synopsys’ Google Cloud Reporting Services Analysis Engines K8S PVC Storage Postgres Database Core Platform Services Common Object Taxonomy Service Triage & Query Issue Service Tool Domain Services Coverity Black Duck Kubernetes Seeker Defensics API / Ingress Control Customer Hosted SaaS model – Synopsys hosted – Get up and running quickly – Always use the latest version Customer hosted – Deploy on your own Kubernetes- based systems – Provision resources to your needs – Load balance based on your needs
  • 21. © 2020 Synopsys, Inc. 21 Polaris Code Sight IDE-based analysis for Coverity Helps developers find and fix security and quality flaws as they code without leaving the IDE Support for all MAJOR IDEs Fast, just-in-time analysis on the desktop Context-sensitive guidance and education Native to the IDE & developer-friendly interface
  • 22. © 2020 Synopsys, Inc. 22 Coverity with Code Sight Fast, accurate, automated best-in-class analysis • Just-in-time high-fidelity incremental analysis serves up analysis results in seconds • Runs automatically in the background and regularly syncs with full baseline analysis • Uses the same comprehensive Coverity engine as full baseline analysis does, for consistent, accurate results
  • 23. © 2020 Synopsys, Inc. 23 Coverity with Code Sight Crisp issues view Prioritized vulnerabilities by category Dataflow view: main and supporting events Triage and dismiss vulnerabilities Link to CWE description
  • 24. © 2020 Synopsys, Inc. 24 Coverity with Code Sight Integrated with eLearning for contextual learning courses
  • 25. © 2020 Synopsys, Inc. 25 Course outline page • Bite-sized chunks • Animated walk-throughs • Case studies of real-world exploits • All types of learning content: video, code snippets, etc. • Knowledge checks at the end of each lesson • Assessment section at the end of the course; pass with 80% or higher to complete the course
  • 26. © 2020 Synopsys, Inc. 26
  • 27. © 2020 Synopsys, Inc. 27 Polaris platform integrations support
  • 28. © 2020 Synopsys, Inc. 28 How Synopsys products fit into the SDLC
  • 29. © 2020 Synopsys, Inc. 29 What is Black Duck Radar? • Native Chrome browser plugin to help identify FOSS components before they are downloaded • Allows you to shift further left than the IDE • Supports multiple repositories, such as Maven Central, NPM, RubyGems, NuGet, PyPI, CocoaPods • Shows security vulnerabilities and potential policy violations
  • 30. © 2020 Synopsys, Inc. 30 Synopsys Software Integrity Group • Synopsys continues to invest heavily in Software Integrity tools and services • Coverity SAST – Find and fix security and quality defects as you code • Black Duck SCA – Secure and manage open source in apps and containers • Seeker IAST – Automate security and data protection testing in CI pipelines • Defensics Fuzzing – Detect protocol vulnerabilities in IoT and embedded devices • Security Testing, Training, and Consulting Services – Scale your AppSec programs with on-demand expertise Best-in-class AppSec tools and services (Forrester Wave for SAST and SCA, Gartner Magic Quadrant)
  • 31. © 2020 Synopsys, Inc. 31 DevSecOps and AppSec best practices • Shift left with security testing • Security tools need to: – Seamlessly integrate with existing development tools / DevOps workflows for CI/CD – Meet the needs of development, DevOps, and security teams – Offer a broad portfolio of testing tools and services (SAST, SCA, IAST, DAST) for each stage of SDLC – Provide a central view of critical vulnerabilities in a scalable cloud platform • Completely invulnerable apps aren’t possible • Companies need to be able to quickly identify the highest risks to their organizations and balance security needs with business agility Key takeaways to ensure high-quality and secure apps