当前位置: 首页 > news >正文

Securing Your DevOps Pipelines -1

Securing Your DevOps Pipelines

  • Background on DevOps
  • Security in DevOps or DevSecOps
  • DevSecOps Tools
  • Setting up a DevSecOps Pipeline
  • Final Security Checks

Background on DevOps

1.1 Understand where DevOps came from

Long development cycles lead to cascading problems

  • Security issues
  • Feature conflicts
  • QA bottleneck
  • Scope creep
  • Overlapping development

Business needed to speed up deploy cycles.

  • Develop -->QA Bugs-->Back to develop-->Add more features

The process needed to be reproducible.

Needed to handle a number of steps.

  • Build artifact
  • Run unit tests
  • Report failed tests
  • Set environment variables
  • Deploy to QA
  • Run integration tests
  • Deploy to staging
  • Clear cache
  • Deploy to feature environment
  • Deploy to production

1.2 Learn how DevOps Works

Plan

Gather all of the feature requirements.

Code

Implement the code to add the feature to the application.

Build

Create the application build files.

Test

Run unit tests, do quality assurance (QA), and run integration tests.

Release

Tag a release of the approved feature implementation.

Deploy

Ship the approved feature implementation to production.

Operate

Keep the application running for end users and customers.

Monitor

Watch for any changes in the application's functionality.

1.3 DevOps versus Waterfall

Everything needs to be finished before deploying.

Incremental release make it less likely for bugs to get to production.

Harder to make changes when feedback comes.

Allow stakeholders to test out functionality as it is completed.

Can make code changes take months to release.

Able to release code changes multiple times per day.

New code slowly gets added to the initial request.

Controls scope creep.

Security gets left until the very end.

Security can be added in a number of places.

Security in DevOps or DevSecOps

2.1 Show where security comes in

Previously at the end of the waterfall

  • Feature development, QA, build candidate
  • Security testing
  • Deployment

Happens at each stage in the pipeline

  • Feature development
  • Security testing
  • QA
  • Security testing

Detecting issues early shortens development.

image-20251022165413876

Easier to include before issues arise.

2.2 Learn how issues get to production

Time restrictions

Hard to get answers

  • What stages should run in parallel?
  • What are the auth methods for services?
  • Which CLI tools should be used?

Unfamiliar with tools

  • Google Cloud
  • Docker
  • AWS
  • Kubernetes
  • Azure
  • Redis

Unfamiliar with pipelines

2.3 Learn the OWAPS 10 Top security risks

image-20251022170304465

https://owasp.org/www-project-top-ten/assets/images/mapping.png

Broken Access Control

Bypass access control checks by adding parameters to the URL.

APIs with missing access controls for POST, PUT and DELETE requests

Not following the principle of least privilege.

Cryptographic Failures

Data transmitted in clear text

Use of deprecated dash functions such as MD5 or SHA1

Have crypto keys checked into source code repositories.

Injection

No validation on user input.

Malicious data gets used in SQL queries

Scripts get add to and executed on a web page

Insecure Design

Missing or ineffective control design.

Security isn't addressed in user stories.

Certain user flow logic is weak.

Security Misconfiguration

Default user names and passwords are still in place for services.

Unnecessary features are installed that open access to restricted data.

Too much information is shared with users in error messages.

Vulnerable and Outdated Components

Current versions of the libraries used are behind the newest versions.

Compatibility with different libraries goes unchecked

Libraries are installed from unreliable sources.

2.4 Understand how attackers gain unauthorized access to apps

They use a number of free and paid tools.

They check for app and system misconfigurations.

They look for secrets in your version control.

They check for extra open ports.

They look for vulnerabilities in your packages.

2.5 Learn the basics of DevSecOps access to apps

Adds automated security best practices to DevOps

image-20251022172456254

Keeps security considerations front of mind for each pipeline stage.

Spreads the responsibility of how security is addressed.

image-20251022172759846

2.6 Use DevSecOps to mitigate risks

Detect common security vulnerabilities automatically.

Monitoring sends alerts to the right teams.

image-20251022173132444

Get feedback faster when new risks are noted.

Lots of tools available.

DAST, OAST, SAST, IAST, Cloud security, Issue tracking

http://www.jsqmd.com/news/19711/

相关文章:

  • 低代码软件开发平台介绍
  • 接口重试的7种常用方案! - 指南
  • 这3种底层思维就是新老班主任的最大区别:不是经验,而
  • windows局域网,能够使用IP打开共享但无法通过机器名打开(0x80070035)
  • 笔记本 copilot按键 PowerToys映射
  • 实用指南:86-python电网可视化项目-6
  • 详细介绍:3.5mm耳机插座技术全解析:从镀层工艺到阻抗稳定性测试
  • 通过电脑调试 Android/iOS 手机端网页
  • java数据类型和转义字符
  • CMS垃圾回收器详解
  • 网页自动转发替换图片
  • 实用指南:用MATLAB画一只可爱的小熊
  • 成熟稳定、省钱好用的AI应用怎么开发?趣丸科技员工助手的技术实践
  • JavaScript 自定义元素类的作用域跨环境兼容管理
  • victoriamonitor监控gcp的cloudrun - Super
  • QT实现QTreeWidget项目拖拽移动功能
  • 解决 Semi Design Upload 组件实现自定义压缩,上传文件后无法触发 onChange
  • 实用指南:生活琐记(3)
  • 重构商业生态:全域分销商城小程序开发赋能商家高效增长 - 实践
  • 设计模式-建造者模式 - 实践
  • 自动化释放5G全部潜力:新西兰电信One NZ的实践之路
  • 实用指南:C++设计模式_创建型模式_原型模式Prototype
  • 第二十一篇
  • DEIMv2浅读
  • 阿里出手了:全免费!号称国内版ClaudeCode?
  • [MS-DOS]MS-DOS 6.22 with CD-ROM Driver.ver.6.22.English下载与安装
  • 2025 年国内品牌设计公司最新推荐排行榜:聚焦行业领军者优势,精选优质服务商深度解析
  • 报考PostgreSQL中级认证证书多少钱?
  • 087_尚硅谷_switch使用细节(1)
  • linux服务器操作系统字符集是GBK,tomcat和部署的程序是UTF-8,启动后应用界面乱码如何解决