DevSecOps Architect
DevSecOps Architect
Introduction
DevSecOps Tools
| Stages | Tools |
|---|---|
| IDE Plugins | DevSkim, JFrog Eclipse, Snyk |
| Pre-Commit Hooks | git-hound, git-secrets, repo-supervisor |
| Secrets Management Tools | Amazon Web Services(AWS), Microsoft, Google |
| Static Application Security Testing (SAST) | Checkmarx, ECG, DerScanner |
| Source Composition Analysis (SCA) | GitHub, BlackDuck, Synx |
| Dynamic Application Security Testing (DAST) | Rapid1, Contrast Security, Acunetix, SonarQube |
| Interactive Application Security Testing (IAST) | Contrast Security, Synopsis, VeraCode |
| Secure infrastructure as code | Cliar, Dockscan, Anchore, tfsec, kube-sec |
| Compliance as code | KitchenCI, ServerSPEC, CHEF INSPEC |
| Runtime application self-protection (RASP) | Signal Sciences, Trend Micro, Imperva |
| Web Application Firewall (WAF) | Azure WAF, AWS WAF, GCP WAF, Cloudflare, Imperva and Wallarm |
| Vulnerability management | Hacker, Archery, Qualys, Microsoft Defender |
Different Stages in DevSecOps and corresponding Tools:
IDE Plugins- IDE extensions that can work like spellcheck and help to avoid basic mistakes at the earliest stage of coding.
- Tools: DevSkim, JFrog Eclipse, and Snyk
Pre-Commit Hooks- Tools from this category prevent you from committing sensitive information like credentials into your code management platform.
- Tools: git-hound, git-secrets and repo-supervisor
Secrets Management Tools- Allow you to control which service has access to what password specifically.
- Tools: Amazon Web Services(AWS), Microsoft, and Google
Static Application Security Testing (SAST)- SAST is about checking source-code (when the app is not running).
- Unfortunately, they take longer to run and often result in a lot of false positives, and can’t be applied to all coding languages.
- Best practice is to do incremental code tests during the weekdays and scan the whole code during the weekend.
- Tools: Checkmarx, ECG, DerScanner
Source Composition Analysis (SCA)- SCA tools look at libraries that you use in your project and flag the ones with known vulnerabilities.
- Tools: GitHub, BlackDuck and Synx
Dynamic Application Security Testing (DAST)- DAST is testing running applications.
- It provides less false positives than SAST but is similarly time-consuming.
- Tools: Rapid1, Contrast Security, Acunetix, SonarQube
Interactive Application Security Testing (IAST)- It combines SAST and DAST elements by placing an agent inside the application and performing real-time analysis anywhere in the development process.
- As a result, the test covers both the source code and all the other external elements like libraries and APIs
- However, this kind of testing can have an adverse impact on the performance of the app.
- Tools: Contrast Security, Synopsis, VeraCode
Secure infrastructure as code- Used to scan Docker images that you download from public repositories.
- Tools: Cliar, Dockscan, Anchore, tfsec, kube-sec
Compliance as code- It will turn your compliance rules and policy requirements into automated tests.
- Tools: KitchenCI, ServerSPEC, CHEF INSPEC
Runtime application self-protection (RASP)- It allows applications to run continuous security checks and react to attacks in real-time by getting rid of the attacker (e.g. closing his session) and alerting your team about the attack.
- Similarly to IAST, it can hurt app performance.
- Tools: Signal Sciences, Trend Micro, Imperva
Web Application Firewall (WAF)- It lets you define specific network rules for a web application and filter, monitor, and block HTTP traffic to and from a web service when it corresponds to known patterns of attacks like, e.g. SQL injection.
- Tools: Azure WAF, AWS WAF, Google Cloud Platform(GCP), WAF, Cloudflare, Imperva and Wallarm
Monitoring tools- DevSecOps takes it to the next level and covers not only things like downtime, but also security threats.
- Tools: Datadog, PerfOps, Nagios
Chaos engineering- Tools from this category allow you to test your app under different scenarios and patch your holes before problems emerge.
- Tools: Gremlin, ChaosToolkit
Vulnerability management- These tools help you identify the holes in your security systems.
- They classify weaknesses by the potential impact of malicious attacks taking advantage of them so that you can focus on fixing the most dangerous ones.
- Some of the tools might come with addons automatically fixing found bugs.
- Tools: Hacker, Archery, Qualys
This post is licensed under CC BY 4.0 by the author.