Bram's Blog

View on GitHub

Global AppSec

This week is Global AppSec Amsterdam, including three days of training and two days of conference. I was able to visit the conference days and attended the following talks.

Opening statement by Martin Knobloch

OWASP focuses its efforts on low entry, so the OWASP membership is only $50,-. For that you get an immediate $50 discount on all OWASP conferences, so there’s no reason NOT to be a member. Also, OWASP makes a diversity commitment to support minorities in the security industry by supporting $100k each year to get a more diverse field of people at conferences.

Keynote by Herbert Bos

Herbert talked about how we are building on a shaky foundation: sand, which also happens to be used for making silicon. But the real thread in his talk was about his terrace (you had to be there).

Some statements:

Two observations:

2014: Security problems were caused by software bugs and misconfiguration 2019: Perfect bugless software is still vulnerable

In IT, over its lifespan up to now, everything was sacrificed to efficiency:

Cloud Native Secure CI/CD Pipelines

CI / Engineer shouldn’t access clusters directly -> Infra via code

https://hubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked

Containers / kubernetes don’t make your code and infra magically become secure Issues to watch for:

Do this:

The Zest with OWASP ZAP

Security takes:

How to we add security to software development Obstacles:

Security team:

Learning security:

Security looks like the darknet, hooded, scary stuff Security looks like the manager adding many more boring tasks

Solution:

ZAP payloads are more input values for the unhappy paths that should be handled by the application appropriately

ZAP learning

  1. Intercepting proxy
  2. Using in a test toolchain with
    • SoapUI
    • Browser
    • Selenium
    • Postman

ZAP passive scanner has: PII scanner (for data like credit cards)

ZEST is a graphical scripting engine to do security testing

Benefits

How to’s:

Playgrounds:

Choosing the right SAST based on hard data - Chris Horn

Find issues in these categories:

List: Awesome static analysis (Github?)

We compare Software analyzers with 2 goals:

For:

7 capabilities of SAST:

Kompar system

OWASP SAMM 2 - Bart de Win

OWASP SAMM Software Assurance Maturity Model

Helps with these questions

It is:

Why?

Business functions:

Streams:

2.0:

Secure Agile development with OWASP SAMM - Rob van der Veer

SIG - Software Improvement Group

Book: Agile Application Security (O’Reilly)

Quotes:

SAMM Agile notes

Main principles:

Per system:

Agile Notes

State of IAM

Traditional:

Modern way:

OpenID connect

OpenID foundation has working groups like:

Uses JWT: JSON Web Token:

OAuth 2 is a framework OID: Implementation of OAuth 2

OpenID Connect discovery: openid-connect-configuration

OpenID COnnect Certified:

FIDO2 works with OpenID connect

Try out WebAuthn with realtime architecture model

Closing keynote by Mikko Hypponen

Future:

All these devices run code, so they can be hacked

Ideas seem innovative at first, but we find out are terrible afterwards (IT asbestos)

APT: Advanced Persistent Threat The keyword is Persistent. They do not give up. More specifically: they target someone or something and they don’t switch to an easier target when the first target becomes to hard to hack.

Machine learning and AI are used at this moment for defense In the future (think about deep-fake), it will be used for offense The one who masters AI Offense, will become the ruler of the world - Putin