Securing Your Web Application Pipeline From Intruders
Is your CI/CD pipeline an open door for intruders? Learn to automate security at every stage and transform your pipeline into a fortress.
#1about 4 minutes
Establishing foundational CI/CD best practices
Following key principles like small build sizes, environment parity, and local testing creates a reliable foundation before adding security layers.
#2about 5 minutes
Why developers often overlook CI/CD security
Developers often neglect pipeline security due to time constraints, conflicting priorities, and general unfamiliarity with CI/CD configuration languages like YAML.
#3about 5 minutes
Understanding common intruder attack vectors
Intruders exploit vulnerabilities by using open-source tools, finding misconfigurations, scanning for open ports, and leveraging known package security flaws.
#4about 3 minutes
Integrating automated security tools in the build phase
Use Static Application Security Testing (SAST) tools like OWASP Dependency-Check and Snyk to scan for package vulnerabilities early in the build process.
#5about 5 minutes
Applying security tools in test and delivery phases
Leverage DAST tools like OWASP ZAP in the test phase and compliance tools like Chef InSpec in the delivery phase to catch dynamic vulnerabilities.
#6about 2 minutes
Securing applications in the production environment
Utilize bug bounty programs like HackerOne and Bugcrowd for continuous security testing in production, but use automated tools with caution to avoid impacting performance.
#7about 7 minutes
Essential manual security practices for your pipeline
Implement crucial security habits such as managing user permissions, closing unused ports, encrypting all data, and regularly checking against the OWASP Top 10.
#8about 7 minutes
Code examples for integrating security scans
See practical examples of how to add a Snyk security scan step into the configuration files for CircleCI, Conductor, and Travis CI.
#9about 3 minutes
Key takeaways for securing your application pipeline
Prioritize keeping secrets out of version control, routinely audit CI/CD configurations, patch known vulnerabilities promptly, and explore attacker tools to improve your defenses.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
05:06 MIN
Hardening the CI/CD pipeline with automated security tools
You can’t hack what you can’t see
05:30 MIN
Integrating security tools into the developer workflow
Secure Code Superstars: Empowering Developers and Surpassing Security Challenges Together
05:52 MIN
Integrating security into the DevOps lifecycle (DevSecOps)
Demystifying DevOps—Pros, cons, dos & don'ts
04:40 MIN
Integrating security throughout the CI/CD process
Plan CI/CD on the Enterprise level!
02:41 MIN
Integrating security across the development lifecycle
Why Security-First Development Helps You Ship Better Software Faster
02:43 MIN
Integrating security earlier in the development lifecycle
Vulnerable VS Code extensions are now at your front door
04:29 MIN
The modern DevSecOps approach to application security
Maturity assessment for technicians or how I learned to love OWASP SAMM
03:29 MIN
Getting started with security tools and team communication
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Chris Heilmann
Dev Digest 134 - Where pixels sing?News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Dev Digest 105 - Security FirstLast Friday's Dev Digest was mostly about security and game topics, so let's take a look what you didn't get in your inbox. We also covered some brand new online courses to get started as a developer or refresh your knowledge. And we wrapped up CODE1...
Chris Heilmann
Dev Digest 110 - XY marks the spotty securityThis time we give you a collection of links about the XZ backdoor, solve the last CODE100 puzzle, announce the next round of it, let you play with colours and explain why Lava lamps are great to keep the web secure.News and ArticlesThe big piece of n...
From learning to earning
Jobs that call for the skills explored in this talk.