TribeQonf2024_Dimpy_ShiftingSecurityLeft

DimpyAdhikary 134 views 17 slides Jul 23, 2024
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

Embedding Sewcurity Throughout Agile Workflow


Slide Content

Dimpy Adhikary Quality Analyst * Embedding Security Throughout Agile Workflow India's Premium-most and Largest Testing Conference

Embedding Security Throughout Agile Workflow Experience On Reactive vs. Proactive Security Approaches. Benefits of Integrating Security Into Team Culture. Context

Embedding Security Throughout Agile Workflow Key Statistics: +34 new adversaries 232 total adversaries tracked 75% increase in cloud environment intrusions 76% increase in eCrime victims on dedicated leak sites 110% increase in cloud-conscious cases 84% of cloud-conscious intrusions focused on eCrime CrowdStrike 2024 Global Threat Report

Embedding Security Throughout Agile Workflow Agenda The Challenge In Reactive Security Approach Ways Of Shifting Security Left Lessons Learnt

Embedding Security Throughout Agile Workflow Security Testing After Deployment Key Challenges: Security Testing Is Deprived Of Needed Attention And Time . No Single Tool for Comprehensive Security In Sprint Security Testing Is Not Feasible Multiple Attack Surfaces Microservices Level Third-Party Dependencies Containers Cloud Infrastructure - Compliance Requirements

Embedding Security Throughout Agile Workflow Shifting Security Left Enforcing Security Policies Early Using Tools And Techniques Continuous Monitoring Training And Collaboration

Feature - Email Subscription To A Daily Newsletter As a User , I want to Subscribe to the daily newsletter, So that I can stay updated with the latest news and updates. As an Attacker , I want to Exploit the email subscription feature So that I can harvest a large number of valid email addresses For spamming or selling on the black market. Embedding Security Throughout Agile Workflow

The First Step - Threat Modelling Map the System: Identify Assets, Actors, Interactions Brainstorm Threats: Consider Vulnerabilities and A ttack vectors . Mitigate & Prioritize: Define Controls and Assess Remaining Risk. Embedding Security Throughout Agile Workflow

Map The System Embedding Security Throughout Agile Workflow

Embedding Security Throughout Agile Workflow

Security In The Code & Build Phase Embedding Security Throughout Agile Workflow

Security In The Testing Phase Embedding Security Throughout Agile Workflow

Embedding Security Throughout Agile Workflow

Security In The Monitoring Phase Application Activity Monitoring Tools New Relic, Datadog, Splunk User Account Monitoring Tools: Okta, Auth0, Microsoft Azure AD Network Traffic Monitoring Tools: Wireshark, SolarWinds, Snort Infrastructure Monitoring Tools: Prometheus, Nagios, Zabbix Compliance Monitoring Tools: Tripwire, Qualys, Rapid7 Embedding Security Throughout Agile Workflow

Embedding Security Throughout Agile Workflow Security Tools Landscape

Learnings From Shifting Security Left Foster Security Training And Awareness. Incorporate Security From The Planning Phase. Adopt Secure Coding Standards . Promote Automated Security Testing. Continuous Monitoring and Logging. Embedding Security Throughout Agile Workflow

Happy Testing ! Dimpy Adhikary dimpyad Embedding Security Throughout Agile Workflow