DevSecOps Architect
Introduction
DevSecOps Tools
Stages | Tools |
---|---|
IDE Plugins | DevSkim, JFrog Eclipse, Snyk |
Pre-Commit Hooks | git-hound, git-secrets, repo-supervisor |
Secrets Management Tools | Amazon Web Services(AWS), Microsoft, Google |
Static Application Security Testing (SAST) | Checkmarx, ECG, DerScanner |
Source Composition Analysis (SCA) | GitHub, BlackDuck, Synx |
Dynamic Application Security Testing (DAST) | Rapid1, Contrast Security, Acunetix, SonarQube |
Interactive Application Security Testing (IAST) | Contrast Security, Synopsis, VeraCode |
Secure infrastructure as code | Cliar, Dockscan, Anchore, tfsec, kube-sec |
Compliance as code | KitchenCI, ServerSPEC, CHEF INSPEC |
Runtime application self-protection (RASP) | Signal Sciences, Trend Micro, Imperva |
Web Application Firewall (WAF) | Azure WAF, AWS WAF, GCP WAF, Cloudflare, Imperva and Wallarm |
Vulnerability management | Hacker, Archery, Qualys, Microsoft Defender |
Different Stages in DevSecOps and corresponding Tools:
IDE Plugins
- IDE extensions that can work like spellcheck and help to avoid basic mistakes at the earliest stage of coding.
- Tools: DevSkim, JFrog Eclipse, and Snyk
Pre-Commit Hooks
- Tools from this category prevent you from committing sensitive information like credentials into your code management platform.
- Tools: git-hound, git-secrets and repo-supervisor
Secrets Management Tools
- Allow you to control which service has access to what password specifically.
- Tools: Amazon Web Services(AWS), Microsoft, and Google
Static Application Security Testing (SAST)
- SAST is about checking source-code (when the app is not running).
- Unfortunately, they take longer to run and often result in a lot of false positives, and can’t be applied to all coding languages.
- Best practice is to do incremental code tests during the weekdays and scan the whole code during the weekend.
- Tools: Checkmarx, ECG, DerScanner
Source Composition Analysis (SCA)
- SCA tools look at libraries that you use in your project and flag the ones with known vulnerabilities.
- Tools: GitHub, BlackDuck and Synx
Dynamic Application Security Testing (DAST)
- DAST is testing running applications.
- It provides less false positives than SAST but is similarly time-consuming.
- Tools: Rapid1, Contrast Security, Acunetix, SonarQube
Interactive Application Security Testing (IAST)
- It combines SAST and DAST elements by placing an agent inside the application and performing real-time analysis anywhere in the development process.
- As a result, the test covers both the source code and all the other external elements like libraries and APIs
- However, this kind of testing can have an adverse impact on the performance of the app.
- Tools: Contrast Security, Synopsis, VeraCode
Secure infrastructure as code
- Used to scan Docker images that you download from public repositories.
- Tools: Cliar, Dockscan, Anchore, tfsec, kube-sec
Compliance as code
- It will turn your compliance rules and policy requirements into automated tests.
- Tools: KitchenCI, ServerSPEC, CHEF INSPEC
Runtime application self-protection (RASP)
- It allows applications to run continuous security checks and react to attacks in real-time by getting rid of the attacker (e.g. closing his session) and alerting your team about the attack.
- Similarly to IAST, it can hurt app performance.
- Tools: Signal Sciences, Trend Micro, Imperva
Web Application Firewall (WAF)
- It lets you define specific network rules for a web application and filter, monitor, and block HTTP traffic to and from a web service when it corresponds to known patterns of attacks like, e.g. SQL injection.
- Tools: Azure WAF, AWS WAF, Google Cloud Platform(GCP), WAF, Cloudflare, Imperva and Wallarm
Monitoring tools
- DevSecOps takes it to the next level and covers not only things like downtime, but also security threats.
- Tools: Datadog, PerfOps, Nagios
Chaos engineering
- Tools from this category allow you to test your app under different scenarios and patch your holes before problems emerge.
- Tools: Gremlin, ChaosToolkit
Vulnerability management
- These tools help you identify the holes in your security systems.
- They classify weaknesses by the potential impact of malicious attacks taking advantage of them so that you can focus on fixing the most dangerous ones.
- Some of the tools might come with addons automatically fixing found bugs.
- Tools: Hacker, Archery, Qualys
This post is licensed under CC BY 4.0 by the author.