SlideShare uma empresa Scribd logo
1 de 28
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
Security Knights slayer of dragons
ECS - Enterprise Security Computing (London)
@FrankSEC42
DEV-OPS & SEC Architecture – Defenders of the appsec realm
https://uk.linkedin.com/in/fracipo
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
What’s in it for me?
2
What’s in in for me?
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
Agenda About the author
Conclusions
Q&A
Solution to reach there
Pillars & Problems
Evolution of the knights & dragons
Context
@FrankSEC42
Take Away
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.ukwww.nsc42.co.ukwww.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
About the Francesco
4
Francesco Cipollone
Founder – NSC42 LTD
I’m a CISO and a CISO Advisor, Cybersecurity Cloud Expert. Speaker, Researcher and
Chair of Cloud security Alliance UK, Researcher and associate to ISC2.
I’ve been helping organizations define and implement cybersecurity strategies and protect
their organizations against cybersecurity attacks
Website Articles NSC42 LinkedIn
Security is everybody’s job
We need to make security cool and frictionless
Copyright © NSC42 Ltd 2019
Email@FrankSec42 Fracipo Linkein
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
How Things Have Changed
5
So what’s the challenge?
How do we defend the castle from dragons?
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Why Fixing vulnerabilities is important
6
Why is important to fix vulnerabilities?
How Big is the problem?
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Major Breaches
7
2009/
2010
2012
Microsoft
Heartland
US Military
Aol
TJMax
2013
2016
2017
2014
2015
2018
Sony PSN
NHS
Betfair
Steam
Deep Root
IRS
Anthem
Dropbox
Lastfm
Blizzard
Marriot
Twitter
MyHeritage
Uber
Quora..
Why fixing Vulnerabilities is everybody’s responsibility?
Myspace
Twitter
Yahoo
Linkedin
Friend Finder
Dailymotion
Mossack Fonseca
JP Morgan
Home Depo
Ebay
Yahoo(orignal)
US Retailers
Adobe
UbiSoft
Court Ventures
2012
2019
…
Yes…because we all get affected by it
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Major Breaches
8
Image Credit Information is Beautiful
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Size of the problem
9
Source:: https://snyk.io/wp-content/uploads/The-State-of-Open-Source-2017.pdf
How long it takes to fix a vulnerability? 16-94 days
Vulnerabilities disclosure:
5.9 years
MAX time from inclusion to disclosure
0 days
MIN time from inclusion to disclosure
2.5 years
AVER time from inclusion to disclosure
Vulnerabilities FIX:
94 days
MAX time from disclosure to fix
0 days
MIN time from disclosure to fix
16 days
AVER time from disclosure to fix
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
The Crisis
10
So Is security Still important in a dev-sec-ops world?
Let’s see how to blend the architecture, governance and
security ops in this new dragon slayer world
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Solution: DEV-OPS + SEC + BIZ at pace and at speed
11
Problem – governance and speed
1. Trust & Verify
2. License to operate/code
3. Day in Day fix Vulnerabilities
>> Set Thresholds: Bild vs Fix, Vulnerability trending
>> Blend Architects and Engineering
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Solution Pillars 3+2
12
Design & Governance Application
Security
Security
Education
Phase 1 Phase 2
Production
Security
• 4 Solution Pillars 3 + 2
• Focus on phases to address the problem
Risk management Framework
Phase 3
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
The DEV-SEC-OPS Revolution: Trust & Verify
13
Trust your developers but verify!
To go at pace you should trust your community of
developers…but verify that they are doing security
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Trust & Verify Framework
14
Application
Security Scanners
Production Dashboard
Development Dashboard
Job Queue
Defects
Bugs
New
Features
Am I compliant with
Code Defects
Target ?
Am i still compliant with Overall
Build vs FIX Targets ?
Triage &
Vulnerability
Per applicationDay to
day fix or build
Code
3rd parties
Components (FOSS +
Libraries)
Engeneers &
Developers
DEV-SEC-OPS Application Group (unit that
works on one or more application)
DEV
Test
Prod
Deployment to prod
Relies on the License
to Operate
Engeneers &
Developers
Application/
Product
Owner
Security Champion
Security
Architect
Security
Vulnerabilities
Bugs&
Errors
NEWFeatures
Thresholds
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
License to operate
15
Trusted DEV-OPS team can operate at speed…
as long as they have the license to operate
DEV
Security
Productio
n
Security
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
The DEV-SEC-OPS Revolution: Trust & Verify
16
Developer can operate fast and deploy as long as they have
a license
1. Trust your developers and apply a ‘license to
operate’
2. Apply governance (light and heavy weight)
3. Make security everybody’s responsibility but
provide resource to guide (during transformation)
4. Blend Architects with Engineering community
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Dashboard for Code Defects -> Under the hood
17
Repositories
Build/Staging/UAT/
Test Environments
Scanner for Code
Scanner for Build
Dashboards For
SAST
DEV Dashboard
Scanner for Test
Dashboard Build/ Test
Production
Prod Scnner Dashboards
PROD Dashboards
Development-Testing Production
Scanner for prod
SET Targets
For Prod &
DEV Vuln
Triage the
vulnerabilities
Scan At
various
Stages
Scanners to
Tickets or
aggregators
DEV
Security
Productio
n
Security
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
OWASP dependency-check
• http://jeremylong.github.io/DependencyCheck/
OWASP dependency-track
• https://github.com/stevespringett/dependency-track
OWASP dependency-check-sonar-plugin
• https://github.com/stevespringett/dependency-check-sonar-plugin
Maven Security Versions
• https://github.com/victims/maven-security-versions
Vulnerable Libraries
18
How to fix vulnerable Libraries? Use 3rd party tools or OWASP/Open
source reference libraries
DEV
Security
Productio
n
Security
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.ukwww.nsc42.co.ukwww.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Trust & Verify – The Verify Part
19
Trusted DEV-OPS team can operate at speed…
as long as they have the license to operate
1. Verify that team does
security training
2. Verify that team reduces
vulnerabilities
3. Verify that team applies
governance
DEV
Security
Productio
n
Security
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Dashboard for Code Defects
20
Dashboard for code defect and thresholds
Key to Verify & maintain the license to operate
DEV
Security
Productio
n
Security
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Definition of security Impacting Change
21
Governanc
e
Functional
Change
OPS
Test
Small Change/ FIX/
Patching
Small Change/ Bugfix/
Patching
Sandbox/Prototyping Deployment Environment
Functional Change - Any Change impacting the core functionalities of an application
DEV-OPS PhaseDesign Phase
Governance Delegated to the
Champion(s) and Application owner(s)
Governance on the Security
DesignAuthority & Security
Architects
Iterations
DEV
Initial Design
(Iterations)
Functional
Change
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Security Education in DEV-SEC-OPS
22
1. Awareness Training For your users
2. Craft Training based on the scanner (faults) data
3. Make the training entertaining (CTF and Rewards)
Security
Education
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Conclusion
23
- Trust And Verify
- Vulnerability Management every day life
- Architect + Engineering = Success
- Data Driven Education
- Governance at scale
Security at pace
Security is everybody’s job
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Mentoring
Research
Events
Networking
Twitter: @csaukchapter
LinkedIn: https://www.linkedin.com/groups/3745837/
CSA-UK - We need you
24
Join!
Every Fortnight 1.30 PM UK
Time
#MentoringMonday Call
@FrankSEC42
Cyber Security Awards 2020
Cloud Security Influencer of the Year
Submission – 10 of May 2020 (TBD)
Ceremony 4 July
2020
#CYSECAWARDS20https://cybersecurityawards.com/
https://cloudsecurityalliance.org.uk
Submit: info@cybersecurityawards.com
Info:
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Q&A
27
Copyright © NSC42 Ltd 2019 (content & Picture under Licence)
www.nsc42.co.ukwww.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo
Contacts
28
Get in touch:
https://uk.linkedin.com/in/fracipo
Francesco.cipollone (at) nsc42.co.uk
www.nsc42.co.uk
Thank you
WHEN YOU ARE CYBERSAFE WE ARE CYBERHAPPY
@FrankSEC42

Mais conteúdo relacionado

Mais procurados

Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...
Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...
Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...Carlo Bonamico
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...NowSecure
 
Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020JayTymchuk
 
DEF CON 27 - workshop - POLOTO - hacking the android apk
DEF CON 27 - workshop - POLOTO - hacking the android apkDEF CON 27 - workshop - POLOTO - hacking the android apk
DEF CON 27 - workshop - POLOTO - hacking the android apkFelipe Prado
 
Progressive Deployment & NoDeploy
Progressive Deployment & NoDeployProgressive Deployment & NoDeploy
Progressive Deployment & NoDeployYi-Feng Tzeng
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowNowSecure
 
Cisco canada education @ advancing learning conference 2014
Cisco canada education @ advancing learning conference 2014Cisco canada education @ advancing learning conference 2014
Cisco canada education @ advancing learning conference 2014Marc Lijour, OCT, BSc, MBA
 
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceDev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceYi-Feng Tzeng
 
Severless PHP Case : Agile Dashboard via GitLab Board API
Severless PHP Case : Agile Dashboard via GitLab Board APISeverless PHP Case : Agile Dashboard via GitLab Board API
Severless PHP Case : Agile Dashboard via GitLab Board APIYi-Feng Tzeng
 
歯磨き.go Go言語の静的解析とコード生成勉強会
歯磨き.go Go言語の静的解析とコード生成勉強会歯磨き.go Go言語の静的解析とコード生成勉強会
歯磨き.go Go言語の静的解析とコード生成勉強会Daisuke Yamashita
 
Safety Assurance and Certification: Current Practices, Challenges, and Brains...
Safety Assurance and Certification: Current Practices, Challenges, and Brains...Safety Assurance and Certification: Current Practices, Challenges, and Brains...
Safety Assurance and Certification: Current Practices, Challenges, and Brains...Roberto Natella
 
From an Experience of Vulnerability Reporting
From an Experience of Vulnerability ReportingFrom an Experience of Vulnerability Reporting
From an Experience of Vulnerability ReportingKaoru Maeda
 
T3DD12 Security Workshop
T3DD12 Security WorkshopT3DD12 Security Workshop
T3DD12 Security WorkshopHelmut Hummel
 
2015 Future of Open Source Survey Results
2015 Future of Open Source Survey Results2015 Future of Open Source Survey Results
2015 Future of Open Source Survey ResultsBlack Duck by Synopsys
 
Healthy Agile Product Security
Healthy Agile Product SecurityHealthy Agile Product Security
Healthy Agile Product SecurityVMware Tanzu
 
State management for ios development
State management for ios developmentState management for ios development
State management for ios developmentDaisuke Yamashita
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesNowSecure
 

Mais procurados (20)

Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...
Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...
Is my Web Application secure? OWASP Top Ten Security Risks and Beyond...
 
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
 
Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020
 
DEF CON 27 - workshop - POLOTO - hacking the android apk
DEF CON 27 - workshop - POLOTO - hacking the android apkDEF CON 27 - workshop - POLOTO - hacking the android apk
DEF CON 27 - workshop - POLOTO - hacking the android apk
 
Progressive Deployment & NoDeploy
Progressive Deployment & NoDeployProgressive Deployment & NoDeploy
Progressive Deployment & NoDeploy
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
 
Cisco canada education @ advancing learning conference 2014
Cisco canada education @ advancing learning conference 2014Cisco canada education @ advancing learning conference 2014
Cisco canada education @ advancing learning conference 2014
 
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceDev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and Compliance
 
Android Secure Coding
Android Secure CodingAndroid Secure Coding
Android Secure Coding
 
Severless PHP Case : Agile Dashboard via GitLab Board API
Severless PHP Case : Agile Dashboard via GitLab Board APISeverless PHP Case : Agile Dashboard via GitLab Board API
Severless PHP Case : Agile Dashboard via GitLab Board API
 
Static analysis for go lang
Static analysis for go langStatic analysis for go lang
Static analysis for go lang
 
歯磨き.go Go言語の静的解析とコード生成勉強会
歯磨き.go Go言語の静的解析とコード生成勉強会歯磨き.go Go言語の静的解析とコード生成勉強会
歯磨き.go Go言語の静的解析とコード生成勉強会
 
Safety Assurance and Certification: Current Practices, Challenges, and Brains...
Safety Assurance and Certification: Current Practices, Challenges, and Brains...Safety Assurance and Certification: Current Practices, Challenges, and Brains...
Safety Assurance and Certification: Current Practices, Challenges, and Brains...
 
About StarForce Technologies
About StarForce TechnologiesAbout StarForce Technologies
About StarForce Technologies
 
From an Experience of Vulnerability Reporting
From an Experience of Vulnerability ReportingFrom an Experience of Vulnerability Reporting
From an Experience of Vulnerability Reporting
 
T3DD12 Security Workshop
T3DD12 Security WorkshopT3DD12 Security Workshop
T3DD12 Security Workshop
 
2015 Future of Open Source Survey Results
2015 Future of Open Source Survey Results2015 Future of Open Source Survey Results
2015 Future of Open Source Survey Results
 
Healthy Agile Product Security
Healthy Agile Product SecurityHealthy Agile Product Security
Healthy Agile Product Security
 
State management for ios development
State management for ios developmentState management for ios development
State management for ios development
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 

Semelhante a Nsc42 security knights slayer of dragons 0-5_very_short_15m_share

Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNSC42 Ltd
 
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...NSC42 Ltd
 
Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...
Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...
Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...Cloud Security Alliance, UK chapter
 
Nsc42-CSA AGM is the cloud secure - is easy if you do it smart
Nsc42-CSA AGM is the cloud secure - is easy if you do it smartNsc42-CSA AGM is the cloud secure - is easy if you do it smart
Nsc42-CSA AGM is the cloud secure - is easy if you do it smartNSC42 Ltd
 
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
Nsc42 - is the cloud secure - is easy if you do it smart UNICOMNsc42 - is the cloud secure - is easy if you do it smart UNICOM
Nsc42 - is the cloud secure - is easy if you do it smart UNICOMNSC42 Ltd
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Testing infrastructure as code
Testing infrastructure as codeTesting infrastructure as code
Testing infrastructure as codePrancer Io
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
Brksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-securityBrksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-securityCisco
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Securing a Cloud Migration
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud MigrationVMware Tanzu
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Jason Jolley
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Denim Group
 

Semelhante a Nsc42 security knights slayer of dragons 0-5_very_short_15m_share (20)

Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
 
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
Nsc42 - is the cloud secure - is easy if you do it smart Cybersecurity&Cloud ...
 
Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...
Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...
Csa UK agm 2019 - Nsc42 - is the cloud secure - is easy if you do it smart Fr...
 
Nsc42-CSA AGM is the cloud secure - is easy if you do it smart
Nsc42-CSA AGM is the cloud secure - is easy if you do it smartNsc42-CSA AGM is the cloud secure - is easy if you do it smart
Nsc42-CSA AGM is the cloud secure - is easy if you do it smart
 
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
Nsc42 - is the cloud secure - is easy if you do it smart UNICOMNsc42 - is the cloud secure - is easy if you do it smart UNICOM
Nsc42 - is the cloud secure - is easy if you do it smart UNICOM
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Testing infrastructure as code
Testing infrastructure as codeTesting infrastructure as code
Testing infrastructure as code
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Brksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-securityBrksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-security
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Securing a Cloud Migration
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud Migration
 
Securing a Cloud Migration
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud Migration
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
 

Último

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 

Último (20)

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

Nsc42 security knights slayer of dragons 0-5_very_short_15m_share

  • 1. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) Security Knights slayer of dragons ECS - Enterprise Security Computing (London) @FrankSEC42 DEV-OPS & SEC Architecture – Defenders of the appsec realm https://uk.linkedin.com/in/fracipo
  • 2. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo What’s in it for me? 2 What’s in in for me?
  • 3. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) Agenda About the author Conclusions Q&A Solution to reach there Pillars & Problems Evolution of the knights & dragons Context @FrankSEC42 Take Away
  • 4. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.ukwww.nsc42.co.ukwww.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo About the Francesco 4 Francesco Cipollone Founder – NSC42 LTD I’m a CISO and a CISO Advisor, Cybersecurity Cloud Expert. Speaker, Researcher and Chair of Cloud security Alliance UK, Researcher and associate to ISC2. I’ve been helping organizations define and implement cybersecurity strategies and protect their organizations against cybersecurity attacks Website Articles NSC42 LinkedIn Security is everybody’s job We need to make security cool and frictionless Copyright © NSC42 Ltd 2019 Email@FrankSec42 Fracipo Linkein
  • 5. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo How Things Have Changed 5 So what’s the challenge? How do we defend the castle from dragons?
  • 6. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Why Fixing vulnerabilities is important 6 Why is important to fix vulnerabilities? How Big is the problem?
  • 7. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Major Breaches 7 2009/ 2010 2012 Microsoft Heartland US Military Aol TJMax 2013 2016 2017 2014 2015 2018 Sony PSN NHS Betfair Steam Deep Root IRS Anthem Dropbox Lastfm Blizzard Marriot Twitter MyHeritage Uber Quora.. Why fixing Vulnerabilities is everybody’s responsibility? Myspace Twitter Yahoo Linkedin Friend Finder Dailymotion Mossack Fonseca JP Morgan Home Depo Ebay Yahoo(orignal) US Retailers Adobe UbiSoft Court Ventures 2012 2019 … Yes…because we all get affected by it
  • 8. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Major Breaches 8 Image Credit Information is Beautiful
  • 9. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Size of the problem 9 Source:: https://snyk.io/wp-content/uploads/The-State-of-Open-Source-2017.pdf How long it takes to fix a vulnerability? 16-94 days Vulnerabilities disclosure: 5.9 years MAX time from inclusion to disclosure 0 days MIN time from inclusion to disclosure 2.5 years AVER time from inclusion to disclosure Vulnerabilities FIX: 94 days MAX time from disclosure to fix 0 days MIN time from disclosure to fix 16 days AVER time from disclosure to fix
  • 10. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo The Crisis 10 So Is security Still important in a dev-sec-ops world? Let’s see how to blend the architecture, governance and security ops in this new dragon slayer world
  • 11. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Solution: DEV-OPS + SEC + BIZ at pace and at speed 11 Problem – governance and speed 1. Trust & Verify 2. License to operate/code 3. Day in Day fix Vulnerabilities >> Set Thresholds: Bild vs Fix, Vulnerability trending >> Blend Architects and Engineering
  • 12. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Solution Pillars 3+2 12 Design & Governance Application Security Security Education Phase 1 Phase 2 Production Security • 4 Solution Pillars 3 + 2 • Focus on phases to address the problem Risk management Framework Phase 3
  • 13. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo The DEV-SEC-OPS Revolution: Trust & Verify 13 Trust your developers but verify! To go at pace you should trust your community of developers…but verify that they are doing security
  • 14. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Trust & Verify Framework 14 Application Security Scanners Production Dashboard Development Dashboard Job Queue Defects Bugs New Features Am I compliant with Code Defects Target ? Am i still compliant with Overall Build vs FIX Targets ? Triage & Vulnerability Per applicationDay to day fix or build Code 3rd parties Components (FOSS + Libraries) Engeneers & Developers DEV-SEC-OPS Application Group (unit that works on one or more application) DEV Test Prod Deployment to prod Relies on the License to Operate Engeneers & Developers Application/ Product Owner Security Champion Security Architect Security Vulnerabilities Bugs& Errors NEWFeatures Thresholds
  • 15. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo License to operate 15 Trusted DEV-OPS team can operate at speed… as long as they have the license to operate DEV Security Productio n Security
  • 16. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo The DEV-SEC-OPS Revolution: Trust & Verify 16 Developer can operate fast and deploy as long as they have a license 1. Trust your developers and apply a ‘license to operate’ 2. Apply governance (light and heavy weight) 3. Make security everybody’s responsibility but provide resource to guide (during transformation) 4. Blend Architects with Engineering community
  • 17. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Dashboard for Code Defects -> Under the hood 17 Repositories Build/Staging/UAT/ Test Environments Scanner for Code Scanner for Build Dashboards For SAST DEV Dashboard Scanner for Test Dashboard Build/ Test Production Prod Scnner Dashboards PROD Dashboards Development-Testing Production Scanner for prod SET Targets For Prod & DEV Vuln Triage the vulnerabilities Scan At various Stages Scanners to Tickets or aggregators DEV Security Productio n Security
  • 18. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo OWASP dependency-check • http://jeremylong.github.io/DependencyCheck/ OWASP dependency-track • https://github.com/stevespringett/dependency-track OWASP dependency-check-sonar-plugin • https://github.com/stevespringett/dependency-check-sonar-plugin Maven Security Versions • https://github.com/victims/maven-security-versions Vulnerable Libraries 18 How to fix vulnerable Libraries? Use 3rd party tools or OWASP/Open source reference libraries DEV Security Productio n Security
  • 19. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.ukwww.nsc42.co.ukwww.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Trust & Verify – The Verify Part 19 Trusted DEV-OPS team can operate at speed… as long as they have the license to operate 1. Verify that team does security training 2. Verify that team reduces vulnerabilities 3. Verify that team applies governance DEV Security Productio n Security
  • 20. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Dashboard for Code Defects 20 Dashboard for code defect and thresholds Key to Verify & maintain the license to operate DEV Security Productio n Security
  • 21. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Definition of security Impacting Change 21 Governanc e Functional Change OPS Test Small Change/ FIX/ Patching Small Change/ Bugfix/ Patching Sandbox/Prototyping Deployment Environment Functional Change - Any Change impacting the core functionalities of an application DEV-OPS PhaseDesign Phase Governance Delegated to the Champion(s) and Application owner(s) Governance on the Security DesignAuthority & Security Architects Iterations DEV Initial Design (Iterations) Functional Change
  • 22. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Security Education in DEV-SEC-OPS 22 1. Awareness Training For your users 2. Craft Training based on the scanner (faults) data 3. Make the training entertaining (CTF and Rewards) Security Education
  • 23. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Conclusion 23 - Trust And Verify - Vulnerability Management every day life - Architect + Engineering = Success - Data Driven Education - Governance at scale Security at pace Security is everybody’s job
  • 24. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Mentoring Research Events Networking Twitter: @csaukchapter LinkedIn: https://www.linkedin.com/groups/3745837/ CSA-UK - We need you 24 Join!
  • 25. Every Fortnight 1.30 PM UK Time #MentoringMonday Call @FrankSEC42
  • 26. Cyber Security Awards 2020 Cloud Security Influencer of the Year Submission – 10 of May 2020 (TBD) Ceremony 4 July 2020 #CYSECAWARDS20https://cybersecurityawards.com/ https://cloudsecurityalliance.org.uk Submit: info@cybersecurityawards.com Info:
  • 27. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Q&A 27
  • 28. Copyright © NSC42 Ltd 2019 (content & Picture under Licence) www.nsc42.co.ukwww.nsc42.co.uk @FrankSEC42https://uk.linkedin.com/in/fracipo Contacts 28 Get in touch: https://uk.linkedin.com/in/fracipo Francesco.cipollone (at) nsc42.co.uk www.nsc42.co.uk Thank you WHEN YOU ARE CYBERSAFE WE ARE CYBERHAPPY @FrankSEC42

Notas do Editor

  1. The Whole concept relies on license to operate: if you promote good code, you good to go How to verify: Thresholds for reduction of vulnerabilities (Dashbaords) Thresholds for Build VS fix Scanners output in jira Teams triage and remediated locally to the pod If something can’t be updated/remediated than risk assessment (not covered here) Application/Product owner (empowered by Pods and Security Champions) decide how many vulnerabilities to fix at every sprint
  2. Q&A