Please enable JavaScript.
Coggle requires JavaScript to display documents.
InfoSec (App Sec (SDLC (CICD (Pipeline Security Controls (Harden pipeline…
InfoSec
App Sec
SDLC
CICD
Components
-
CI Server
Jenkins
is an open-source continuous integration software tool written in the Java programming language for testing and reporting on isolated changes in a larger code base in real time.
-
-
-
Continuous Integration
Pre-commit / Code
- IDE security reviews
- Real-Time SAST
-
Continuous Delivery
Test
- Dynamic code analysis
- test exploitability
- penetration testing
Deploy / Release
Stage
- Passive Pen Test
- Infrastructure Scan
- 1 more item...
-
-
-
-
-
Threats
image repositories, build servers, containers, third-party tools
-
-
-
Agile
iterative approach that focuses on collaboration, customer feedback and small rapid releases
-
Software Needs
- Encryption
- Authentication
- Logging
- Asset Management
- Zoning & Containment
Best Practices
Automate security testing and monitoring tools into relevant stages of the software production pipeline
-
-
Reduce false positives; otherwise, the results of tests will be ignored
-
-
-
-
-
API
-
-
Best Practices
-
-
use ID stored as session object, not from client
-
-
-
-
-
Strategy
-
Frameworks
NIST
Identify
Asset visibility (systems, Data, processes)Organization exposureRisks
-
-
-
-
-
-
-
Risk
Priorities
-
Critical Assets, Departments, Tiers
-
-
-
-
-
Data Protection
DLP
Detection models
- Rule-based/Regex
- Conceptual/lexicon
- Statistical Analysis
- Pre-built categories
- database fingerprinting
- exact file matching
- Partial document matching
-
-
-
-
-
-
-
-
-
-
-
-
Network Monitoring
-
-
Capture
Netflow
Traffic metadata
senders’ / receivers’ IP addresses, the ports they communicated on, the length of the conversation and the amount of data transferred.
-
-
-
-
-
-
-
-
-
-
-
-
-
Configuration Management
-
Config File
where to get images, network config, storage, log settings
-
-
Layers
-
Container Runtime
Monitoring Baseline container environment
Real-time scanning of containers for deviations
Keep environment immutable - rolling updates
Secure coding
-
-
Persistent storage
-
If a container does not need write access to a storage directory, limit it to read-only access
Models
Cyber Kill Chain
-
Countermeasures
-
-
-
-
-