KEMBAR78
Sec 101 | PDF
Sec
101
Diego Pacheco
@diego_pacheco
❏ Cat's Father
❏ Head of Software Architect
❏ Agile Coach
❏ SOA/Microservices Expert
❏ DevOps Practitioner
❏ Speaker
❏ Author
diegopacheco
http://diego-pacheco.blogspot.com.br/
About me...
https://diegopacheco.github.io/
We are used to Security in the physical world
Software Security
Why should we care?
❏ Ethics
❏ Customer Experience
❏ Brand Integrity
❏ Compliance
Defense in depth
❏ NSA
❏ Layers
❏ All IT systems
❏ It’s all about redundancy
❏ AV, Auth, Encryption, MFA,
Sandboxes, DMZ, VPN,
Firewalls, etc...
Least Privilege Principle
❏ Minimum level of access
and privilege.
❏ Avoid wide open
permissions like *
❏ Avoid Attacker Surface
❏ Spots malware spread
Encryption
❏ Symmetric & Asymmetric
❏ Encoding Information
❏ AES Standard
❏ Key Diversity
❏ Envelope Encryption
❏ App vs Storage Encryption
❏ Rotations
TLS and mTLS
❏ Privacy and data integrity
❏ Secure Connections
❏ Asymmetric Encryption
❏ Email, Chats, VoIP, HTTPS
❏ mTLS - No Man in the
Middle
❏ Rotations
Misconfiguration & Error Handler
❏ Unnecessary enable ports
❏ Stacks Traces
❏ Default Passwords
❏ Software Out of Date
❏ Missing Sec configs
Input Sanitization
❏ SQL Injection
❏ Prepared Statements
❏ Remote File Inclusion
❏ Paths / Sequences
❏ Always clean user inputs
❏ Use UUIDs
XSS (Cross Site Scripting)
❏ JavaScript Injection
❏ Storage (view by admin)
❏ Reflected (back to user)
❏ Latest Browser versions
❏ Requires Sanitization
Insecure Serialization/Deserialization
❏ XXE - External XML Entity
SAML(SSO), < SOAP 1.2
❏ XML Upload from untrusted
sources
❏ Disable XML external entity
and DTD processing
❏ Validate XML with XSD
Know Vulnerabilities
❏ OWASP top 10
❏ CVE/CWE
❏ Code Analysis
❏ Keep Software up to date
Logging & Audit Trail
❏ Local / Unmonitored logs
❏ Audit trail on high-value
transactions
❏ Monitoring on suspicious activities
Threat Analysis
❏ All models are wrong but
some are useful for us
❏ Allow us to see the Threats
❏ Help figure out priorities
❏ Democratize security
❏ https://threagile.io/
Engineering Friction
❏ Tests, DevOps, ...
❏ Security might cripple
engineering capabilities
❏ Security is a Refactoring
enabler force
❏ Security is Everybody's jobs
Sec
101
Diego Pacheco

Sec 101

  • 1.
  • 2.
    @diego_pacheco ❏ Cat's Father ❏Head of Software Architect ❏ Agile Coach ❏ SOA/Microservices Expert ❏ DevOps Practitioner ❏ Speaker ❏ Author diegopacheco http://diego-pacheco.blogspot.com.br/ About me... https://diegopacheco.github.io/
  • 3.
    We are usedto Security in the physical world
  • 4.
  • 5.
    Why should wecare? ❏ Ethics ❏ Customer Experience ❏ Brand Integrity ❏ Compliance
  • 6.
    Defense in depth ❏NSA ❏ Layers ❏ All IT systems ❏ It’s all about redundancy ❏ AV, Auth, Encryption, MFA, Sandboxes, DMZ, VPN, Firewalls, etc...
  • 7.
    Least Privilege Principle ❏Minimum level of access and privilege. ❏ Avoid wide open permissions like * ❏ Avoid Attacker Surface ❏ Spots malware spread
  • 8.
    Encryption ❏ Symmetric &Asymmetric ❏ Encoding Information ❏ AES Standard ❏ Key Diversity ❏ Envelope Encryption ❏ App vs Storage Encryption ❏ Rotations
  • 9.
    TLS and mTLS ❏Privacy and data integrity ❏ Secure Connections ❏ Asymmetric Encryption ❏ Email, Chats, VoIP, HTTPS ❏ mTLS - No Man in the Middle ❏ Rotations
  • 12.
    Misconfiguration & ErrorHandler ❏ Unnecessary enable ports ❏ Stacks Traces ❏ Default Passwords ❏ Software Out of Date ❏ Missing Sec configs
  • 13.
    Input Sanitization ❏ SQLInjection ❏ Prepared Statements ❏ Remote File Inclusion ❏ Paths / Sequences ❏ Always clean user inputs ❏ Use UUIDs
  • 14.
    XSS (Cross SiteScripting) ❏ JavaScript Injection ❏ Storage (view by admin) ❏ Reflected (back to user) ❏ Latest Browser versions ❏ Requires Sanitization
  • 15.
    Insecure Serialization/Deserialization ❏ XXE- External XML Entity SAML(SSO), < SOAP 1.2 ❏ XML Upload from untrusted sources ❏ Disable XML external entity and DTD processing ❏ Validate XML with XSD
  • 16.
    Know Vulnerabilities ❏ OWASPtop 10 ❏ CVE/CWE ❏ Code Analysis ❏ Keep Software up to date
  • 17.
    Logging & AuditTrail ❏ Local / Unmonitored logs ❏ Audit trail on high-value transactions ❏ Monitoring on suspicious activities
  • 18.
    Threat Analysis ❏ Allmodels are wrong but some are useful for us ❏ Allow us to see the Threats ❏ Help figure out priorities ❏ Democratize security ❏ https://threagile.io/
  • 19.
    Engineering Friction ❏ Tests,DevOps, ... ❏ Security might cripple engineering capabilities ❏ Security is a Refactoring enabler force ❏ Security is Everybody's jobs
  • 20.