SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Continuous integration (CI) is the practice, in software engineering, of merging all developer working
copies with a shared mainline several times a day. - Wikipedia
Continuous integration has become more popular following the increase of software development groups adopting the
agile methodology.
Agile development provides opportunities to assess the direction throughout the development lifecycle. Using
regular cadences of work, known as Sprints or iterations, at the end of which teams must present a potentially
shippable product increment achieves the ability to assess the product throughout development. Rather than looking
at a single planned result, agile allows teams to assess their results every short period of time, usually around two
weeks, and if required steer the project in a new direction.
In the world of SaaS, agile and continuous Integration/Delivery has and is being adopted quite widely. Development
teams are now able to deliver and modify their releases multiple times a day using the Cloud's flexibility and control
while at the same time implementing the right techniques to develop quicker and better using agile and continuous
integration/delivery.
Traditional application security methods are not able to support these quick cycles:
1. Most security testing techniques are dependent on project completion and usually take a long time to carry out
which halt the development process and can cause delays to scheduled release dates.
2. Developers are accountable for their code and as such, also accountable for security vulnerabilities found in the
code. Traditional security testing solutions are employed at the end of the development process, sometime
months after development of the code is completed. In such instances, developers have to go back to review old
code, re-familiarize themselves with it, which takes a long time to do. Traditional Application Security testing
solutions tend to ignore or are incapable of handling the process of solving vulnerabilities once found. This is
critical in continuous integration to prevent long "road blocks" and enhance developer education on the most
effective mitigation locations and techniques.
3. Penetration tests will, in most cases, run as black box tests and require a separate team of testers or a third
party vendor who will perform the tests at the end of the development cycle. Pen tests are expensive and slow.
On top of that, they have to be performed on every new release to changes have not affected security. This is
virtually impossible and financially overwhelming . when talking about CICD (Continuous Integration Continuous
Deployment)
THE CHALLENGES OF CONTINUOUS INTEGRATION AND
APPLICATION SECURITY TESTING
Continuous Integration allows companies to generate up to hundreds of builds a
day and cope with multiple code changes in a short timeframe.
How does Checkmarx address Continuous Integration?
Checkmarx CxSAST is a highly accurate and flexible Application Security analysis product that allows organizations to
automatically scan un-compiled/un-built code and identify hundreds of security vulnerabilities in the most prevalent
coding languages. CxSAST is effectively integrated into the SDLC process to streamline the detection and
remediation process.
Checkmarx's main mission is to make Application security an integral part of the SDLC (Software Development Life
Cycle). Continuous integration is a significant part of agile software development lifecycle and increases developer's
ability to detect and resolve security related bugs in short cycles, allowing a noteworthy improvement of "bug free"
builds and releases.
Checkmarx not only detects the vulnerabilities on raw source code/non-buildable code, allowing either complete or
partial code scanning at any given time, but goes a great length forward providing the developer with:
Graphical representation of the vulnerable data flows Specific optimized locations to fix the code (i.e. best fix
locations), Recommendations how to fix the code in the most efficient way.
Similar to QA processes, Application security should and can be integrated into the development and testing
environments. Therefore all this is done during the SDLC process and with minimal to no impact on the build
release.
Enforce your security policy in the SDLC
Checkmarx's CxSAST fully supports Continuous Integration and Continuous Deployment for management of
Security vulnerabilities.
1. Out of the box integration with the most popular "Continuous Integration servers" makes this task
as simple and straight forward as it gets: Jenkins, Bamboo, TeamCity, Visual Studio TFS, Anthillpro.
2. Web Services API - CxSAST API provides the ability to create client scripts orchestrating CxSAST
projects and easily integrating with Build Servers and Source repositories of any kind.
3. CLI - CxSAST scans can be invoked from the CxConsole Command Line Interface (CLI) command. This
is especially useful for embedding calls in software management tools, allowing Continuous Integration
in the Software Development Lifecycle
4 Simple Steps to ensure secure coding as part of your Build Management process
INTEGRATE Checkmarx is flexible enough to integrate seamlessly within your SDLC, we support the most common
build servers or alternatively you can implement a simple API to provide high quality SAST (Static Application
Security Testing) in a smooth and simple to operate environment.
ANALYZE & TRACK Checkmarx's CxSAST produces a high-level vulnerability report which is linked to a color coded
HTML report that identifies the specific areas of code in which the vulnerabilities exist allowing easy and speedy fix.
Bug tracking is made easy with CxSAST’s integration. Automatically communicating with different bug tracking tools
such as Jira to reflect the results (open bugs automatically) and define specific areas in the code or specific coders
that are causing vulnerabilities.
SET & ENFORCE Enforce your security policy and ensure that flawed code doesn’t move into production. Just mark
the build as Unstable and send an alert or break the build if the security vulnerability instances in the build exceed
the specified threshold set by your organization’s security policy.
AUTOMATE Continuous integration servers are set to trigger a Checkmarx scan allowing complete automation of
the process leading to:
• Detection of Security flaws as they appear, reducing time to fix thereby reducing development costs.
• Reducing developer efforts and frustration by remediating issues immediately rather than going back to long
forgotten code
• Eliminating release delays
• Cutting down ongoing Pen-test costs and using those for verification tests only
Read Checkmarx LIVEPERSON Case Study

Mais conteúdo relacionado

Destaque

DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby StepsPriyanka Aash
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015DevOpsDays Tel Aviv
 
[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise EditionITAS VIETNAM
 
Graph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC ChapterGraph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC ChapterCheckmarx
 

Destaque (6)

DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
 
[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition
 
Graph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC ChapterGraph Visualization - OWASP NYC Chapter
Graph Visualization - OWASP NYC Chapter
 

Mais de Checkmarx

The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxCheckmarx
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the HackersCheckmarx
 
The 5 Biggest Benefits of Source Code Analysis
The 5 Biggest Benefits of Source Code AnalysisThe 5 Biggest Benefits of Source Code Analysis
The 5 Biggest Benefits of Source Code AnalysisCheckmarx
 
A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceCheckmarx
 
How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisCheckmarx
 
Source Code vs. Binary Code Analysis
Source Code vs. Binary Code AnalysisSource Code vs. Binary Code Analysis
Source Code vs. Binary Code AnalysisCheckmarx
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 
The App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolThe App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolCheckmarx
 
The Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-InsThe Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-InsCheckmarx
 
10 Steps To Secure Agile Development
10 Steps To Secure Agile Development10 Steps To Secure Agile Development
10 Steps To Secure Agile DevelopmentCheckmarx
 

Mais de Checkmarx (10)

The Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's ToolboxThe Web AppSec How-To: The Defender's Toolbox
The Web AppSec How-To: The Defender's Toolbox
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers
 
The 5 Biggest Benefits of Source Code Analysis
The 5 Biggest Benefits of Source Code AnalysisThe 5 Biggest Benefits of Source Code Analysis
The 5 Biggest Benefits of Source Code Analysis
 
A Platform for Application Risk Intelligence
A Platform for Application Risk IntelligenceA Platform for Application Risk Intelligence
A Platform for Application Risk Intelligence
 
How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code Analysis
 
Source Code vs. Binary Code Analysis
Source Code vs. Binary Code AnalysisSource Code vs. Binary Code Analysis
Source Code vs. Binary Code Analysis
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 
The App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolThe App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST Tool
 
The Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-InsThe Security State of The Most Popular WordPress Plug-Ins
The Security State of The Most Popular WordPress Plug-Ins
 
10 Steps To Secure Agile Development
10 Steps To Secure Agile Development10 Steps To Secure Agile Development
10 Steps To Secure Agile Development
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

The Challenges of Continous Integration and Application Security

  • 1. Continuous integration (CI) is the practice, in software engineering, of merging all developer working copies with a shared mainline several times a day. - Wikipedia Continuous integration has become more popular following the increase of software development groups adopting the agile methodology. Agile development provides opportunities to assess the direction throughout the development lifecycle. Using regular cadences of work, known as Sprints or iterations, at the end of which teams must present a potentially shippable product increment achieves the ability to assess the product throughout development. Rather than looking at a single planned result, agile allows teams to assess their results every short period of time, usually around two weeks, and if required steer the project in a new direction. In the world of SaaS, agile and continuous Integration/Delivery has and is being adopted quite widely. Development teams are now able to deliver and modify their releases multiple times a day using the Cloud's flexibility and control while at the same time implementing the right techniques to develop quicker and better using agile and continuous integration/delivery. Traditional application security methods are not able to support these quick cycles: 1. Most security testing techniques are dependent on project completion and usually take a long time to carry out which halt the development process and can cause delays to scheduled release dates. 2. Developers are accountable for their code and as such, also accountable for security vulnerabilities found in the code. Traditional security testing solutions are employed at the end of the development process, sometime months after development of the code is completed. In such instances, developers have to go back to review old code, re-familiarize themselves with it, which takes a long time to do. Traditional Application Security testing solutions tend to ignore or are incapable of handling the process of solving vulnerabilities once found. This is critical in continuous integration to prevent long "road blocks" and enhance developer education on the most effective mitigation locations and techniques. 3. Penetration tests will, in most cases, run as black box tests and require a separate team of testers or a third party vendor who will perform the tests at the end of the development cycle. Pen tests are expensive and slow. On top of that, they have to be performed on every new release to changes have not affected security. This is virtually impossible and financially overwhelming . when talking about CICD (Continuous Integration Continuous Deployment) THE CHALLENGES OF CONTINUOUS INTEGRATION AND APPLICATION SECURITY TESTING Continuous Integration allows companies to generate up to hundreds of builds a day and cope with multiple code changes in a short timeframe.
  • 2. How does Checkmarx address Continuous Integration? Checkmarx CxSAST is a highly accurate and flexible Application Security analysis product that allows organizations to automatically scan un-compiled/un-built code and identify hundreds of security vulnerabilities in the most prevalent coding languages. CxSAST is effectively integrated into the SDLC process to streamline the detection and remediation process. Checkmarx's main mission is to make Application security an integral part of the SDLC (Software Development Life Cycle). Continuous integration is a significant part of agile software development lifecycle and increases developer's ability to detect and resolve security related bugs in short cycles, allowing a noteworthy improvement of "bug free" builds and releases. Checkmarx not only detects the vulnerabilities on raw source code/non-buildable code, allowing either complete or partial code scanning at any given time, but goes a great length forward providing the developer with: Graphical representation of the vulnerable data flows Specific optimized locations to fix the code (i.e. best fix locations), Recommendations how to fix the code in the most efficient way. Similar to QA processes, Application security should and can be integrated into the development and testing environments. Therefore all this is done during the SDLC process and with minimal to no impact on the build release. Enforce your security policy in the SDLC Checkmarx's CxSAST fully supports Continuous Integration and Continuous Deployment for management of Security vulnerabilities. 1. Out of the box integration with the most popular "Continuous Integration servers" makes this task as simple and straight forward as it gets: Jenkins, Bamboo, TeamCity, Visual Studio TFS, Anthillpro. 2. Web Services API - CxSAST API provides the ability to create client scripts orchestrating CxSAST projects and easily integrating with Build Servers and Source repositories of any kind. 3. CLI - CxSAST scans can be invoked from the CxConsole Command Line Interface (CLI) command. This is especially useful for embedding calls in software management tools, allowing Continuous Integration in the Software Development Lifecycle
  • 3. 4 Simple Steps to ensure secure coding as part of your Build Management process INTEGRATE Checkmarx is flexible enough to integrate seamlessly within your SDLC, we support the most common build servers or alternatively you can implement a simple API to provide high quality SAST (Static Application Security Testing) in a smooth and simple to operate environment. ANALYZE & TRACK Checkmarx's CxSAST produces a high-level vulnerability report which is linked to a color coded HTML report that identifies the specific areas of code in which the vulnerabilities exist allowing easy and speedy fix. Bug tracking is made easy with CxSAST’s integration. Automatically communicating with different bug tracking tools such as Jira to reflect the results (open bugs automatically) and define specific areas in the code or specific coders that are causing vulnerabilities. SET & ENFORCE Enforce your security policy and ensure that flawed code doesn’t move into production. Just mark the build as Unstable and send an alert or break the build if the security vulnerability instances in the build exceed the specified threshold set by your organization’s security policy. AUTOMATE Continuous integration servers are set to trigger a Checkmarx scan allowing complete automation of the process leading to: • Detection of Security flaws as they appear, reducing time to fix thereby reducing development costs. • Reducing developer efforts and frustration by remediating issues immediately rather than going back to long forgotten code • Eliminating release delays • Cutting down ongoing Pen-test costs and using those for verification tests only Read Checkmarx LIVEPERSON Case Study