Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Shifting Left Like a Boss

Shifting Left Like a Boss

presented by Tanya Janca
at OWASP Night, Tokyo Japan

OWASP Japan

March 06, 2018
Tweet

More Decks by OWASP Japan

Other Decks in Technology

Transcript

  1. Shifting Left, Like a Boss Application Security Foundations Tanya Janca

    [email protected] [email protected] OWASP Ottawa Chapter Leader OWASP DevSlop Project Leader @sheHacksPurple
  2. What is ‘Shifting Left’? If you imagine the SDLC written

    out on a piece of paper, the further left you go, the earlier you are in the System Development Life Cycle. @SheHacksPurple ’Shifting Left’ means the security team wants to be invited to the party earlier. Requirements Design Code Testing Release
  3. Who am I? I’m Tanya Janca; a Senior Cloud Advocate

    for Microsoft, an application security evangelist, trainer, public speaker, ethical hacker, OWASP Ottawa chapter leader, OWASP DevSlop project leader, effective altruist, software developer since the late 90’s. I have been paid to be geeky for over 20 years! Goal: to change the way we make software so that the easiest way to do something is also the most secure way. @SheHacksPurple
  4. What is ‘Shifting Left’? If you imagine the SDLC written

    out on a piece of paper, the further left you go, the earlier you are in the System Development Life Cycle. @SheHacksPurple It will cost you less and you will do a better job if you consider security in every phase of the SDLC. Requirements Design Code Testing Release
  5. An AppSec Program: The Main Course • Vulnerability (VA) Scans

    and Assessments • Threat Modeling • Secure Code Reviews (Static Code Analysis) • Penetration Tests (PenTests) • This applies to both Custom Apps and COTS
  6. An AppSec Program: The Gravy • Educating Developers on Secure

    Coding Practices with workshops, talks, lessons • Secure Coding Standards • Responsible/Coordinated Disclosure • Secure code library and other reference materials, creating custom tools @SheHacksPurple
  7. An AppSec Program: Dessert! • Bug Bounty Programs • Capture

    The Flag (CTF) contests • Red Team Exercises @SheHacksPurple
  8. YOU shifting left: testing your code • Most people use

    a web proxy security scanner to test their web applications • It sits between your browser and the internet • It will automate tests for you, tell you what to fix, and, if it's a good one, HOW to fix the issues • There are paid and free options available • Don't use a scanner on an app you don't have permission to test, it's illegal @SheHacksPurple
  9. YOU shifting left: testing your code -CAUTION • Ensure you

    have permission from your boss before you start, there may be policies against it (ask the security team too!) • Be considerate, scanners can hog resources • Be careful, scanners can be destructive • Back up your data before hand • This is an activity that requires some learning before you can start, to ensure you don't cause any damage or tick anyone off • Inform security when you start and finish
  10. YOU shifting Left: Threat Modelling • Figuring out negative use

    cases, and ways to defend against them • Basically a brainstorming session with programmers and security to figure out how someone may try to abuse your app • Search you code for these threats • Thinking like an adversary can not only uncover potential issues, it can be fun and educational.
  11. YOU shifting Left: Reviewing your code • Most people use

    a static code analyzer, but this can also be done manually • Search for your threat models • Even the most expensive tool produces many false positives, the 'work' in this exercise is figuring out what is a real issue and what is not • OWASP Dependancy check • You can find more than just security bugs
  12. YOU shifting Left: Writing better code • Train yourself on

    secure coding practices • There are many quality online resources, free and paid, as well as courses and conferences • Check online for the best and most secure way to do things, before you start coding • Become the security expert on your dev team, and help the rest of your team learn @SheHacksPurple