thanks to swisscom - owasp · 2020-01-17 · 1. introduction 2. phases purpose possible candidates...

56
Thanks to Swisscom www.swisscom.com @Swisscom_de

Upload: others

Post on 23-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Thanks to Swisscom

wwwswisscomcom Swisscom_de

The OWASP Foundation httpswwwowasporg

S-SDLC ndash Ready for Clouds

Robert Schneider

robertschneiderowasporg

Robert Schneider

ICT Security Officer Swisscom IT Services

robertschneiderowasporg

schattenbaum_ch

wwwschattenbaumch

wwwowaspch

Table of Contents

1 Introduction

2 Phases

Purpose

Possible candidates

Pitfalls

3 Wrap up

4 Questions amp Open discussion

4

Disclaimer

This talk is not going to be about

SDLC basics (Waterfall Agile SW Development Sprints hellip)

Checks for malicious behaviour (additional features to assure this)

5

Introduction

What are we building

6

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 2: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

The OWASP Foundation httpswwwowasporg

S-SDLC ndash Ready for Clouds

Robert Schneider

robertschneiderowasporg

Robert Schneider

ICT Security Officer Swisscom IT Services

robertschneiderowasporg

schattenbaum_ch

wwwschattenbaumch

wwwowaspch

Table of Contents

1 Introduction

2 Phases

Purpose

Possible candidates

Pitfalls

3 Wrap up

4 Questions amp Open discussion

4

Disclaimer

This talk is not going to be about

SDLC basics (Waterfall Agile SW Development Sprints hellip)

Checks for malicious behaviour (additional features to assure this)

5

Introduction

What are we building

6

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 3: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Robert Schneider

ICT Security Officer Swisscom IT Services

robertschneiderowasporg

schattenbaum_ch

wwwschattenbaumch

wwwowaspch

Table of Contents

1 Introduction

2 Phases

Purpose

Possible candidates

Pitfalls

3 Wrap up

4 Questions amp Open discussion

4

Disclaimer

This talk is not going to be about

SDLC basics (Waterfall Agile SW Development Sprints hellip)

Checks for malicious behaviour (additional features to assure this)

5

Introduction

What are we building

6

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 4: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Table of Contents

1 Introduction

2 Phases

Purpose

Possible candidates

Pitfalls

3 Wrap up

4 Questions amp Open discussion

4

Disclaimer

This talk is not going to be about

SDLC basics (Waterfall Agile SW Development Sprints hellip)

Checks for malicious behaviour (additional features to assure this)

5

Introduction

What are we building

6

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 5: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Disclaimer

This talk is not going to be about

SDLC basics (Waterfall Agile SW Development Sprints hellip)

Checks for malicious behaviour (additional features to assure this)

5

Introduction

What are we building

6

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 6: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Introduction

What are we building

6

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 7: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

7

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 8: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

8

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 9: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

9

IDE Unit Testing

Vuln Scan

Code Review

SCM

CI

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 10: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Introduction

What do we have to keep in mind

Wide range of coding language support

CI Jenkins Bamboo hellip

SCM GIT SVN hellip

Traceability (Logging)

Multiuser amp -tenant

10

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 11: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Introduction

What do we want to achieve

As much automation as possible

Developers are integrated in automated monitoring

As few additional effort for developers as possible

Early detection of software flaws

11

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 12: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

12

IDE

LampS

IP Scan Vuln Scan

Code Review

SCM

CI Unit Testing

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 13: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Introduction

This should help us to achieve

A secure cloud

13

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 14: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Phases

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

14

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 15: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

INTELLECTUAL PROPERTY SCAN

15

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 16: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

IP Scan

Who is using Open Source Software (OSS)

16

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 17: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

IP Scan

What OSS components do you use

In which version

17

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 18: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

IP Scan

Are you sure that you know them all

Even snippets

18

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 19: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

IP Scan

Has Security approved the use of them

Legal as well

19

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 20: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

IP Scan

Are you allowed to contribute your work

If yes

What are you allowed to contribute

back to the community

How are you allowed to do that

20

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 21: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

IP Scan

Is one of the used components vulnerable to a CVE

21

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 22: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Possible candidates

Palamida

Open Logic

Black Duck

22

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 23: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

WWWOHLOHNET

23

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 24: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Pitfalls

Processes of different operation units do not merge as easy as you would like them to

You may need additional employees

Do you allow the tool to connect to the internet and transmit data

What do you do after you know your problems

24

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 25: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

CODE REVIEW

25

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 26: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Code Review

Detect software flaws as early as possible

Even some bad coding practices

26

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 27: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Code Review

Long-term benefits

Developers get to know what actually to look for and

Know how to prevent these flaws from the beginning

27

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 28: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Code Review

Time amp budget saving

28

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 29: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Possible candidates

Sonatype

HP Fortify

Defensecode ThunderScan

Checkmarx

See also wwwowasporg

29

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 30: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Pitfalls

Training needed

False Positives amp Negatives

Developers do not see the tool as an improvement

Management does not see the long-term benefits

30

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 31: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

WHAT ABOUT BINARIES

31

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 32: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Binaries

Veracode

Big players are using it

Placed in the USA

Your data does not stay at ldquohomerdquo

32

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 33: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

VULNERABILITY SCANNING

33

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 34: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Vulnerability Scanning

Is the ready-to-deploy application still vulnerable

34

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 35: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Vulnerability Scanning

This phase is comparable to an automated Penetration test

35

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 36: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

36

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 37: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Vulnerability Scanning

Pre-deployment

Again checking for OWASP Top 10 and

Even the flaws we have not been able to test for during phase 2

37

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 38: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Possible candidates

WhiteHat Security Sentinel

Quotium Seeker

HP WebInspect

Defensecode Web Security Scanner

Cenzic Hailstorm

Burp Suite Pro

Acunetix

38

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 39: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

WebSockets

Burp Suite Pro (v1521)

39

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 40: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Pitfalls

Training needed

False Positives amp Negatives

ldquoAutomatedrdquo deployment of applications needed (Sandbox)

Fixing times

40

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 41: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

STRESS amp LOAD TESTING

41

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 42: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

S amp L Testing

How does it scale

Will the software ldquoruinrdquo us when we start using it in the cloud

42

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 43: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Possible candidates

Proxy Sniffer

OpenSTA

Loadrunner

JMeter

43

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 44: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Pitfalls

Automation probably impossible due to the need of user scripts

You may miss an important use case and therefore get an inaccurate feedback

Testing environment

Testing data

44

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 45: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

WRAP UP

45

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 46: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

To be ready for clouds you do not need something completely new according to the S-SDLC

However you have to be aware that your software may not get accepted on every cloud as easy as you might think

46

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 47: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

In a first step try to find the one phase that improves your S-SDLC the most

1 Intellectual Property Scan

2 Code Review

3 Vulnerability Scanning

4 Stress amp Load Testing

47

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 48: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

Intellectual Property Scan Benefits

Know what OSS you are using and

Know their Licenses

48

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 49: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

Code Review Benefits

Detect software flaws as early as possible

Even some bad coding practices

49

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 50: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

Vulnerability Scanning Benefits

Know if the ready-to-deploy application is still vulnerable

50

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 51: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

Stress amp Load Testing Benefits

Know how the application scales

51

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 52: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Recommendation

Dev amp Sec Code Review

Legal IP Scan

Security Vulnerability Scanning

Operation Stress amp Load Testing

52

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 53: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

Wrap up

Try to help and not to annoy by adapting the S-SDLC

You need feedback for improvements

53

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 54: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

QUESTIONS amp OPEN DISCUSSION

54

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 55: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

55

Keep up to date

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus

Page 56: Thanks to Swisscom - OWASP · 2020-01-17 · 1. Introduction 2. Phases Purpose Possible candidates Pitfalls 3. Wrap up 4. ... Burp Suite Pro Acunetix 38 . WebSockets Burp Suite Pro

56

Want to support OWASP

Become member annual donation of

$50 Individual

$5000 Corporate

enables the support of OWASP projects mailing lists conferences podcasts grants and global strategic focus