Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 5: Hardening, DevSecOps Integration, Container Security and WAF
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
- Infrastructure Hardening: Follow CIS benchmarks to reduce risk across hardware and software.
- Principle of Least Privilege: Grant only necessary access and revoke unnecessary permissions.
- Access Control: Enforce strong authentication, restrict network access via firewalls, and monitor system access and network IP addresses.
- Patching and Logging: Apply security patches based on CVE tracking, and implement auditing and logging policies.
- Secure Connections: Enable TLS 1.2/1.3, use strong ciphers and secure cookies, and implement SSO or MFA as needed.
- Automation: Increases efficiency, reduces human error, and ensures consistent security checks.
- Tool Integration: Combine SAST/IAST and WAFs with issue tracking (e.g., Jira) for continuous monitoring.
- Compliance Automation: Identify applicable controls and automate compliance measurement within the SDLC.
- Monitoring Metrics: Track deployment frequency, patch timelines, and the percentage of code tested automatically.
- Code Scanning and Testing: Use static analysis tools and check for vulnerable dependencies.
- Admission Control: Block unsafe container images, e.g., those exposing passwords.
- Privilege Restriction: Run containers with minimal privileges; avoid root or privileged flags.
- System Calls and Benchmarks: Limit powerful calls like Ptrace and ensure hosts meet CIS benchmarks for Docker/Kubernetes.
- Protection Capabilities: Mitigates threats like SQL injection, XSS, and file inclusion; supports OWASP Top 10 protection.
- Security Models: Blacklist (negative), whitelist (positive), or hybrid.
- Deployment Strategy:
- Ensure WAF meets application security goals
- Test alongside RASP or DAST tools
- Integrate with SIEM and security workflows
- Support compliance (PCI, HIPAA, GDPR)
- Gap Analysis: Compare policies against NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover).
- Privacy Review: Assess potential privacy violations and mitigation strategies.
- Open-Source Licensing Review: Confirm license compliance and categorize risks (low, medium, high).
- Security Test Results Review: Address vulnerabilities from SAST, IAST, WAF prior to release.
- Certify the Release: Document and control software releases using a formal approval process.
- Scanning and Patching: Use SCAP-compliant tools like Nessus, Rapid7, or Qualys; apply updates via automated tools (e.g., SolarWinds Patch Manager, SCCM).
- Vulnerability Tools: Schedule recurring network scans, define targets, and manage scan plugins to optimize performance.
- Secure Deployment ensures that security is embedded in the release process.
- Integrates practices from infrastructure hardening, DevSecOps, container security, WAF deployment, secure reviews, and CVM.
- Moves beyond checklists to continuous, automated risk management, ensuring deployed systems remain secure.
Produced by:
https://www.podcaistudio.com/
Todavía no hay opiniones