SlideShare a Scribd company logo
1 of 38
Download to read offline
OWASP FOUNDATION
TM
Matt Tesauro
@matt_tesauro
Fred Blaise
@FredBlaise
(madchap)
introduced to you by
OWASP FOUNDATION
Matt - Who is this guy?
• Reformed programmer and
AppSec engineer
• 13+ years in the OWASP community
• OWASP AppSec Pipeline Leader
• OWASP Defect Dojo Maintainer
• OWASP WTE Leader
• Former Global Board Member, employee
• 20+ years using FLOSS and Linux
• Currently a Golang fanboy
• Ee Dan in Tang Soo Do Mi Guk Kwan
(2nd degree black belt)
OWASP FOUNDATION
● Ops guy at heart, manager who wants to
remain reasonably technical ;-)
● Crossed the french Alps by foot
(autonomous - Leman lake to
Mediterranean sea)
● Product Security leader
● DefectDojo core moderator
← Fred
Lac
miroir →
OWASP FOUNDATION
This is how I feel
when I log into the
Nth security tool
web console...
And when I have to
combine multiple
tool’s output for
reporting
OWASP FOUNDATION
90% of Enterprise Vulnerability programs
OWASP FOUNDATION
But WHY!
OWASP FOUNDATION
OWASP DefectDojo
An open-source application vulnerability correlation and
security orchestration tool.
The source of truth for a security program that makes vulnerability
management work by
• Consolidating and deduplicating findings from multiple tools
• Create findings and reconcile status with defect trackers (e.g. JIRA)
• Enabling automation with its REST API
• Maintain products and applications information
OWASP FOUNDATION
Use cases - ingest all the things
Ad-hoc / manual
• Ad-hoc tools report upload, centralize
• Keep track of internal security assessments
• Leverage for your 3rd party pentests
• Track findings from your teams threat models
Complianc’ish
• Map and enforce your SLAs
• Keep track of your risk acceptances
CI
● Call DefectDojo directly from your CI pipelines
● Or from whatever abstraction/framework
OWASP FOUNDATION
Tech stack
+ 2
=
OWASP FOUNDATION
Features ‘Bullet list’
• Manages AppSec program
• Application inventory + metadata
• e.g., compliance, regulations
• Metrics / dashboards / reporting
• OWASP ASVS built in
• Tagging on multiple levels
• Historical knowledge of past
assessments
• Calendar of security activities
• Export to Google Sheets
• REST API / Swagger-ified
• SSO (Okta, Google, SAML, ...)
• Notifications to JIRA, slack, MS
teams, email
• Ingest reports from multiple tools
And more...
OWASP FOUNDATION
How many different tools do you use?
• DAST tools
• SAST tools
• Composition analysis/3rd party library tools
• Infrastructure tools
• Cloud tools
• Docker tools
• ...
OWASP FOUNDATION
How many of these can DefectDojo import?
100
and growing
OWASP FOUNDATION
TM
Automation
where DefectDojo shines
OWASP FOUNDATION
There’s never enough people or time...
• AppSec teams size is small vs Dev teams size
• Automate all the things that don’t take a human brain
• DefectDojo (and its REST API) is the heart of AppSec
automation
OWASP FOUNDATION
OWASP FOUNDATION
First Gen AppSec Pipeline
OWASP FOUNDATION
OWASP FOUNDATION
Demo: gasp-docker
Golang 3nd Generation AppSec Pipeline
(using docker)
OWASP FOUNDATION
AppSec Pipeline Stats
15 Repos
4 Months
5,100 Runs
25,000+
Container Executions
OWASP FOUNDATION
Automation Results
2014 2015 2016
Number of
Assessments 44 224 414
Headcount N/A -3.5 -2
Percentage
Increase N/A 450% 107%
OWASP FOUNDATION
TM
Deployment options
OWASP FOUNDATION
docker-compose
● As easy as docker-compose pull && docker-compose up
● Can override the profiles for easy development
● Can also be used for some (semi) prod-like workloads
○ Still run the database somewhere dedicated
● Probably the most tested way of deploying
○ And all our tests run on docker
OWASP FOUNDATION
Real world docker-compose
• 1 EC2 instance t2.large (2 vCPUs, 8GB of RAM)
• Database running on AWS RDS (MySQL)
• DefectDojo app overall settings
• uWSGI: 4 processes / 6 threads (24 concurrent connections per “django” pod)
• Celery: prefork mode, custom prefetch multipliers with autoscaling.
→ Good for up to ~200K findings
→ Running full dedupe computation may likely kill you (celery workers
will not cope need more CPU)
OWASP FOUNDATION
kubernetes / helm
- Packaged with Helm 3
- Run locally with minikube (or else, but we’ve done local minikube)
- Can run with minimal changes on your favorite cloud provider
- Do not yet support file uploads
OWASP FOUNDATION
Real world k8s example
• GKE cluster, 5 nodes (n1-standard-4) (also includes all ops related pods, not just defectdojo)
• 3 “django” pods (uWSGI), 6 celery pods by default -> auto-scaling
• Allows for HA and seamless rolling upgrades
• if the django database migration do not take too long…
• Database running on Google’s Cloud SQL (Postgres)
• 21GB in size - we had to disable audit mode for now :-(
• DefectDojo app overall settings
• uWSGI: 4 processes / 6 threads (24 concurrent connections per “django” pod)
• Celery: prefork mode, custom prefetch multipliers with autoscaling.
~75 products
~in DB: 1.2M findings (half are dups),
150K findings ingested per month /
5000 per day
OWASP FOUNDATION
godojo (setup.bash was EOL’ed!)
New stand-alone installer
Features
• Single binary installer
• 160+ configurable options
with sane defaults (yaml)
• All options can be
overridden with ENV vars
• Non-interactive (optional)
• Multiple logging levels
• Install a release, a specific
commit, or branch
OWASP FOUNDATION
TM
Recent improvements and next up
OWASP FOUNDATION
Recent improvements
- Refactoring
- Parser code
- JIRA handling code
- Tests
- Way more unit and integration tests FTW
- Release governance
- Re-import (also refactored)
- Now keep tracks of delta in-band
- Dedupe algorythm now matching the regular import one
- Findings grouping to push as one to JIRA
- Performance improvements
- Many more: Over 120 PRs merged every month!
OWASP FOUNDATION
Up next
● Coming soon: new authorization model (kudos to StefanFI!)
○ Right now behind feature flag, testing welcome!
○ Should be the default authorization model coming in autumn/winter.
● APIv1 or APIv2?
○ v1 has been EOL’ed (end of 2020)
○ v2 set to get more love, better swagger
● GSoC
○ First attempts to build something with ReactJS
● Helm chart published with every release starting with 1.15.0
$ helm search repo defectdojo
NAME CHART VERSION APP VERSION DESCRIPTION
helm-charts/defectdojo 1.5.1 1.14.0-dev A Helm chart for Kubernetes to install DefectDojo
OWASP FOUNDATION
Deduplication and jira groups
OWASP FOUNDATION
TM
Community
OWASP FOUNDATION
The nucleus
Aaron Weaver Greg Anderson Valentijn Scholten
Jannik Jürgens Cody Maffucci Damien Carol
OWASP FOUNDATION
An active
project
2021 Google
Summer of Code
OWASP FOUNDATION
We got stars on ours
OWASP FOUNDATION
How can you help?
• Write some code (e.g. a parser) / submit a PR
• Submit issues
• Help with the documentation
• Provide an example of scanner output
• Write code / docs for a deployment method
• Join the Slack channel and answer questions
• Donate / Sponsor a feature enhancement
OWASP FOUNDATION
Latest from contributors, not moderators!
Only examples, for all contribs see the release notes or merged PRs
● Brand new authorization model - by StefanFI
● Performance improvements - by Daniel Naab
● GitHub Actions - Kubernetes/Helm related - dsever, bgoareguer
● New importers/parsers - SPoint42, jis0324, hasantayyar, bp4151,
mohcer and quite a few others!
● API enhancements - RomainJufer, xens
OWASP FOUNDATION
Try it yourself anytime
Many things we have not talked about...
https://demo.defectdojo.org
Or clone and docker-compose up -d
OWASP FOUNDATION
SCAN THE QR CODE TO
COMPLETE THE SURVEY
Rate this Session
Thank You!
TM
OWASP, Open Web Application Security Project, Global AppSec and AppSec Days are Trademarks of the OWASP Foundation, Inc.
Thank you
See around on the OWASP Slack o/
Or
https://forms.gle/b55Uget61YWXPV1y8

More Related Content

What's hot

Docker: From Zero to Hero
Docker: From Zero to HeroDocker: From Zero to Hero
Docker: From Zero to Herofazalraja
 
Introduction to docker
Introduction to dockerIntroduction to docker
Introduction to dockerInstruqt
 
Docker Introduction
Docker IntroductionDocker Introduction
Docker IntroductionPeng Xiao
 
Docker introduction (1)
Docker introduction (1)Docker introduction (1)
Docker introduction (1)Gourav Varma
 
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...Simplilearn
 
CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...
CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...
CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...Amazon Web Services
 
Devops Devops Devops
Devops Devops DevopsDevops Devops Devops
Devops Devops DevopsKris Buytaert
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachMatt Tesauro
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines Abdul_Mujeeb
 
Introduction to Docker Compose
Introduction to Docker ComposeIntroduction to Docker Compose
Introduction to Docker ComposeAjeet Singh Raina
 
Introduction to kubernetes
Introduction to kubernetesIntroduction to kubernetes
Introduction to kubernetesRishabh Indoria
 
Kubernetes
KubernetesKubernetes
Kuberneteserialc_w
 

What's hot (20)

Docker: From Zero to Hero
Docker: From Zero to HeroDocker: From Zero to Hero
Docker: From Zero to Hero
 
Introduction to docker
Introduction to dockerIntroduction to docker
Introduction to docker
 
Docker Introduction
Docker IntroductionDocker Introduction
Docker Introduction
 
Docker introduction (1)
Docker introduction (1)Docker introduction (1)
Docker introduction (1)
 
DevOps
DevOpsDevOps
DevOps
 
Docker
DockerDocker
Docker
 
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
 
CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...
CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...
CI/CD Best Practices for Building Modern Applications - MAD302 - Anaheim AWS ...
 
Power of Azure Devops
Power of Azure DevopsPower of Azure Devops
Power of Azure Devops
 
Devops Devops Devops
Devops Devops DevopsDevops Devops Devops
Devops Devops Devops
 
Azure DevOps
Azure DevOpsAzure DevOps
Azure DevOps
 
The State of DevSecOps
The State of DevSecOpsThe State of DevSecOps
The State of DevSecOps
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's Reach
 
DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines DevSecOps Basics with Azure Pipelines
DevSecOps Basics with Azure Pipelines
 
Introduction to Docker Compose
Introduction to Docker ComposeIntroduction to Docker Compose
Introduction to Docker Compose
 
Introduction to kubernetes
Introduction to kubernetesIntroduction to kubernetes
Introduction to kubernetes
 
Welcome to Azure Devops
Welcome to Azure DevopsWelcome to Azure Devops
Welcome to Azure Devops
 
Azure DevOps
Azure DevOpsAzure DevOps
Azure DevOps
 
Kubernetes
KubernetesKubernetes
Kubernetes
 
(ARC307) Infrastructure as Code
(ARC307) Infrastructure as Code(ARC307) Infrastructure as Code
(ARC307) Infrastructure as Code
 

Similar to Intro to DefectDojo at OWASP Switzerland

OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityMatt Tesauro
 
What we talk about when we talk about DevOps
What we talk about when we talk about DevOpsWhat we talk about when we talk about DevOps
What we talk about when we talk about DevOpsRicard Clau
 
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!Matt Tesauro
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10OWASP
 
AppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptxAppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptxJosh Grossman
 
AppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptxAppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptxTuynNguyn819213
 
Django deployment with PaaS
Django deployment with PaaSDjango deployment with PaaS
Django deployment with PaaSAppsembler
 
Extending DevOps to Big Data Applications with Kubernetes
Extending DevOps to Big Data Applications with KubernetesExtending DevOps to Big Data Applications with Kubernetes
Extending DevOps to Big Data Applications with KubernetesNicola Ferraro
 
Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...
Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...
Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...Edward Wilde
 
Public PaaS Throwdown!
Public PaaS Throwdown!Public PaaS Throwdown!
Public PaaS Throwdown!Ronak Mallik
 
Practical PaaS presentation
Practical PaaS presentationPractical PaaS presentation
Practical PaaS presentationhmalphettes
 
Cloud and agile software projects: Overview and Benefits
Cloud and agile software projects: Overview and BenefitsCloud and agile software projects: Overview and Benefits
Cloud and agile software projects: Overview and BenefitsGuillaume Berche
 
Webdevcon Keynote hh-2012-09-18
Webdevcon Keynote hh-2012-09-18Webdevcon Keynote hh-2012-09-18
Webdevcon Keynote hh-2012-09-18Pierre Joye
 

Similar to Intro to DefectDojo at OWASP Switzerland (20)

OWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security SanityOWASP DefectDojo - Open Source Security Sanity
OWASP DefectDojo - Open Source Security Sanity
 
What we talk about when we talk about DevOps
What we talk about when we talk about DevOpsWhat we talk about when we talk about DevOps
What we talk about when we talk about DevOps
 
OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!OWASP WTE - Now in the Cloud!
OWASP WTE - Now in the Cloud!
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10
 
Stackato
StackatoStackato
Stackato
 
Stackato v6
Stackato v6Stackato v6
Stackato v6
 
EVOLVE'16 | Keynote | Cat Reusswig | Taking Your AEM Implementation to The RO...
EVOLVE'16 | Keynote | Cat Reusswig | Taking Your AEM Implementation to The RO...EVOLVE'16 | Keynote | Cat Reusswig | Taking Your AEM Implementation to The RO...
EVOLVE'16 | Keynote | Cat Reusswig | Taking Your AEM Implementation to The RO...
 
Dev Ops without the Ops
Dev Ops without the OpsDev Ops without the Ops
Dev Ops without the Ops
 
AppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptxAppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptx
 
AppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptxAppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptx
 
Django deployment with PaaS
Django deployment with PaaSDjango deployment with PaaS
Django deployment with PaaS
 
What DevOps Isn't
What DevOps Isn'tWhat DevOps Isn't
What DevOps Isn't
 
Extending DevOps to Big Data Applications with Kubernetes
Extending DevOps to Big Data Applications with KubernetesExtending DevOps to Big Data Applications with Kubernetes
Extending DevOps to Big Data Applications with Kubernetes
 
DevOps tools for winning agility
DevOps tools for winning agilityDevOps tools for winning agility
DevOps tools for winning agility
 
Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...
Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...
Docker and serverless Randstad Jan 2019: OpenFaaS Serverless: when functions ...
 
Public PaaS Throwdown!
Public PaaS Throwdown!Public PaaS Throwdown!
Public PaaS Throwdown!
 
Practical PaaS presentation
Practical PaaS presentationPractical PaaS presentation
Practical PaaS presentation
 
Cloud and agile software projects: Overview and Benefits
Cloud and agile software projects: Overview and BenefitsCloud and agile software projects: Overview and Benefits
Cloud and agile software projects: Overview and Benefits
 
Stackato v5
Stackato v5Stackato v5
Stackato v5
 
Webdevcon Keynote hh-2012-09-18
Webdevcon Keynote hh-2012-09-18Webdevcon Keynote hh-2012-09-18
Webdevcon Keynote hh-2012-09-18
 

More from Matt Tesauro

Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Matt Tesauro
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfHacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfMatt Tesauro
 
Practical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful ProgramsPractical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful ProgramsMatt Tesauro
 
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API VulnerabilitiesBlack and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API VulnerabilitiesMatt Tesauro
 
Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API LandscapeMatt Tesauro
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityMatt Tesauro
 
The Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingThe Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingMatt Tesauro
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityMatt Tesauro
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.Matt Tesauro
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with ScissorsMatt Tesauro
 
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...Matt Tesauro
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program Matt Tesauro
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityMatt Tesauro
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramMatt Tesauro
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Matt Tesauro
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterMatt Tesauro
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015Matt Tesauro
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestMatt Tesauro
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineMatt Tesauro
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt Tesauro
 

More from Matt Tesauro (20)

Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfHacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
 
Practical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful ProgramsPractical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful Programs
 
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API VulnerabilitiesBlack and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
 
Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API Landscape
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
 
The Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingThe Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security Testing
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into security
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with Scissors
 
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based Security
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
Matt tesauro Lessons from DevOps: Taking DevOps practices into your AppSec Li...
 

Recently uploaded

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Intro to DefectDojo at OWASP Switzerland

  • 1. OWASP FOUNDATION TM Matt Tesauro @matt_tesauro Fred Blaise @FredBlaise (madchap) introduced to you by
  • 2. OWASP FOUNDATION Matt - Who is this guy? • Reformed programmer and AppSec engineer • 13+ years in the OWASP community • OWASP AppSec Pipeline Leader • OWASP Defect Dojo Maintainer • OWASP WTE Leader • Former Global Board Member, employee • 20+ years using FLOSS and Linux • Currently a Golang fanboy • Ee Dan in Tang Soo Do Mi Guk Kwan (2nd degree black belt)
  • 3. OWASP FOUNDATION ● Ops guy at heart, manager who wants to remain reasonably technical ;-) ● Crossed the french Alps by foot (autonomous - Leman lake to Mediterranean sea) ● Product Security leader ● DefectDojo core moderator ← Fred Lac miroir →
  • 4. OWASP FOUNDATION This is how I feel when I log into the Nth security tool web console... And when I have to combine multiple tool’s output for reporting
  • 5. OWASP FOUNDATION 90% of Enterprise Vulnerability programs
  • 7. OWASP FOUNDATION OWASP DefectDojo An open-source application vulnerability correlation and security orchestration tool. The source of truth for a security program that makes vulnerability management work by • Consolidating and deduplicating findings from multiple tools • Create findings and reconcile status with defect trackers (e.g. JIRA) • Enabling automation with its REST API • Maintain products and applications information
  • 8. OWASP FOUNDATION Use cases - ingest all the things Ad-hoc / manual • Ad-hoc tools report upload, centralize • Keep track of internal security assessments • Leverage for your 3rd party pentests • Track findings from your teams threat models Complianc’ish • Map and enforce your SLAs • Keep track of your risk acceptances CI ● Call DefectDojo directly from your CI pipelines ● Or from whatever abstraction/framework
  • 10. OWASP FOUNDATION Features ‘Bullet list’ • Manages AppSec program • Application inventory + metadata • e.g., compliance, regulations • Metrics / dashboards / reporting • OWASP ASVS built in • Tagging on multiple levels • Historical knowledge of past assessments • Calendar of security activities • Export to Google Sheets • REST API / Swagger-ified • SSO (Okta, Google, SAML, ...) • Notifications to JIRA, slack, MS teams, email • Ingest reports from multiple tools And more...
  • 11. OWASP FOUNDATION How many different tools do you use? • DAST tools • SAST tools • Composition analysis/3rd party library tools • Infrastructure tools • Cloud tools • Docker tools • ...
  • 12. OWASP FOUNDATION How many of these can DefectDojo import? 100 and growing
  • 14. OWASP FOUNDATION There’s never enough people or time... • AppSec teams size is small vs Dev teams size • Automate all the things that don’t take a human brain • DefectDojo (and its REST API) is the heart of AppSec automation
  • 16. OWASP FOUNDATION First Gen AppSec Pipeline
  • 18. OWASP FOUNDATION Demo: gasp-docker Golang 3nd Generation AppSec Pipeline (using docker)
  • 19. OWASP FOUNDATION AppSec Pipeline Stats 15 Repos 4 Months 5,100 Runs 25,000+ Container Executions
  • 20. OWASP FOUNDATION Automation Results 2014 2015 2016 Number of Assessments 44 224 414 Headcount N/A -3.5 -2 Percentage Increase N/A 450% 107%
  • 22. OWASP FOUNDATION docker-compose ● As easy as docker-compose pull && docker-compose up ● Can override the profiles for easy development ● Can also be used for some (semi) prod-like workloads ○ Still run the database somewhere dedicated ● Probably the most tested way of deploying ○ And all our tests run on docker
  • 23. OWASP FOUNDATION Real world docker-compose • 1 EC2 instance t2.large (2 vCPUs, 8GB of RAM) • Database running on AWS RDS (MySQL) • DefectDojo app overall settings • uWSGI: 4 processes / 6 threads (24 concurrent connections per “django” pod) • Celery: prefork mode, custom prefetch multipliers with autoscaling. → Good for up to ~200K findings → Running full dedupe computation may likely kill you (celery workers will not cope need more CPU)
  • 24. OWASP FOUNDATION kubernetes / helm - Packaged with Helm 3 - Run locally with minikube (or else, but we’ve done local minikube) - Can run with minimal changes on your favorite cloud provider - Do not yet support file uploads
  • 25. OWASP FOUNDATION Real world k8s example • GKE cluster, 5 nodes (n1-standard-4) (also includes all ops related pods, not just defectdojo) • 3 “django” pods (uWSGI), 6 celery pods by default -> auto-scaling • Allows for HA and seamless rolling upgrades • if the django database migration do not take too long… • Database running on Google’s Cloud SQL (Postgres) • 21GB in size - we had to disable audit mode for now :-( • DefectDojo app overall settings • uWSGI: 4 processes / 6 threads (24 concurrent connections per “django” pod) • Celery: prefork mode, custom prefetch multipliers with autoscaling. ~75 products ~in DB: 1.2M findings (half are dups), 150K findings ingested per month / 5000 per day
  • 26. OWASP FOUNDATION godojo (setup.bash was EOL’ed!) New stand-alone installer Features • Single binary installer • 160+ configurable options with sane defaults (yaml) • All options can be overridden with ENV vars • Non-interactive (optional) • Multiple logging levels • Install a release, a specific commit, or branch
  • 28. OWASP FOUNDATION Recent improvements - Refactoring - Parser code - JIRA handling code - Tests - Way more unit and integration tests FTW - Release governance - Re-import (also refactored) - Now keep tracks of delta in-band - Dedupe algorythm now matching the regular import one - Findings grouping to push as one to JIRA - Performance improvements - Many more: Over 120 PRs merged every month!
  • 29. OWASP FOUNDATION Up next ● Coming soon: new authorization model (kudos to StefanFI!) ○ Right now behind feature flag, testing welcome! ○ Should be the default authorization model coming in autumn/winter. ● APIv1 or APIv2? ○ v1 has been EOL’ed (end of 2020) ○ v2 set to get more love, better swagger ● GSoC ○ First attempts to build something with ReactJS ● Helm chart published with every release starting with 1.15.0 $ helm search repo defectdojo NAME CHART VERSION APP VERSION DESCRIPTION helm-charts/defectdojo 1.5.1 1.14.0-dev A Helm chart for Kubernetes to install DefectDojo
  • 32. OWASP FOUNDATION The nucleus Aaron Weaver Greg Anderson Valentijn Scholten Jannik Jürgens Cody Maffucci Damien Carol
  • 34. OWASP FOUNDATION We got stars on ours
  • 35. OWASP FOUNDATION How can you help? • Write some code (e.g. a parser) / submit a PR • Submit issues • Help with the documentation • Provide an example of scanner output • Write code / docs for a deployment method • Join the Slack channel and answer questions • Donate / Sponsor a feature enhancement
  • 36. OWASP FOUNDATION Latest from contributors, not moderators! Only examples, for all contribs see the release notes or merged PRs ● Brand new authorization model - by StefanFI ● Performance improvements - by Daniel Naab ● GitHub Actions - Kubernetes/Helm related - dsever, bgoareguer ● New importers/parsers - SPoint42, jis0324, hasantayyar, bp4151, mohcer and quite a few others! ● API enhancements - RomainJufer, xens
  • 37. OWASP FOUNDATION Try it yourself anytime Many things we have not talked about... https://demo.defectdojo.org Or clone and docker-compose up -d
  • 38. OWASP FOUNDATION SCAN THE QR CODE TO COMPLETE THE SURVEY Rate this Session Thank You! TM OWASP, Open Web Application Security Project, Global AppSec and AppSec Days are Trademarks of the OWASP Foundation, Inc. Thank you See around on the OWASP Slack o/ Or https://forms.gle/b55Uget61YWXPV1y8