KTH / devops-course

Repository of the DevOps course at KTH Royal Institute of Technology DD2482
191 stars 427 forks source link

DevOps and Security - DevSecOps #18

Open monperrus opened 6 years ago

monperrus commented 6 years ago

Wikipedia references:

monperrus commented 6 years ago

Principles:

monperrus commented 6 years ago

Intrusion detection: https://en.wikipedia.org/wiki/Intrusion_detection_system

(signature based, anomaly detection)

monperrus commented 6 years ago

Very good set of pointers: https://www.sqreen.io/checklists/devops-security-checklist

sbuc commented 6 years ago

Mapping security design principles to devops on one axis, mapping security concepts/mechanisms to devops on another.

lsc commented 6 years ago

Dynamic and short lived secrets for authorisation, see for example AWS IAM Roles are implemented or Hashicorp Vault.

monperrus commented 6 years ago

Open Source: Simplifying Serverless Secrets https://open.nytimes.com/open-source-simplifying-serverless-secrets-in-google-cloud-a95451e545b1

bbaudry commented 6 years ago

Vault and kubernetes https://github.com/kelseyhightower/vault-on-google-kubernetes-engine

monperrus commented 5 years ago

CI/CD enables automated program hardening:

Operating system protection through program evolution, Fred Cohen, 1993

monperrus commented 5 years ago

Check your repos... Crypto-coin-stealing code sneaks into fairly popular NPM lib (2m downloads per week) https://www.theregister.co.uk/2018/11/26/npm_repo_bitcoin_stealer/

monperrus commented 5 years ago

7 Tips for Container and Kubernetes Security http://lxer.com/module/newswire/ext_link.php?rid=264809

gluckzhang commented 5 years ago

Microservices Hierarchy of Needs KUBERNETES: AN OVERVIEW (This is a nice introduction to Kubernetes architecture and advantages)

monperrus commented 5 years ago

On The Relation Between Outdated Docker Containers, Severity Vulnerabilities and Bugs. http://arxiv.org/abs/1811.12874

bbaudry commented 5 years ago

Reproducible builds https://reproducible-builds.org/

monperrus commented 5 years ago

added wikipedia references in the top post of this thread.

monperrus commented 5 years ago

Security standards: NIST800 53, ISO27000

monperrus commented 5 years ago

Super Secret Dynamic Secrets with Vault https://tech.gogoair.com/super-secret-dynamic-secrets-with-vault-cf6f29fefc8f

monperrus commented 5 years ago

Vault http://vaultproject.io

monperrus commented 5 years ago

InSpec https://www.inspec.io

monperrus commented 5 years ago

On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs. https://arxiv.org/pdf/1811.12874

monperrus commented 5 years ago

On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images. https://ieeexplore.ieee.org/abstract/document/8667984/

monperrus commented 5 years ago

Kubernetes security: 5 mistakes to avoid https://enterprisersproject.com/article/2019/5/kubernetes-security-5-mistakes

bbaudry commented 5 years ago

security for containers https://github.com/coreos/clair

gluckzhang commented 5 years ago

Two interesting papers on container security / vulnerabilities analysis:

monperrus commented 5 years ago

The Three Rs of Enterprise Security: Rotate, Repave, and Repair https://builttoadapt.io/the-three-r-s-of-enterprise-security-rotate-repave-and-repair-f64f6d6ba29d

bbaudry commented 5 years ago

A framework to secure the integrity of software supply chains https://in-toto.io/ https://github.com/in-toto/in-toto/

bbaudry commented 5 years ago

DoD Enterprise DevSecOps Reference Design

monperrus commented 5 years ago

Attack graph generation for microservice architecture https://www.researchgate.net/profile/Amjad_Ibrahim/publication/332814067_Attack_graph_generation_for_microservice_architecture/links/5ccd8a30299bf14d9576f2f5/Attack-graph-generation-for-microservice-architecture.pdf

bbaudry commented 5 years ago

Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask https://blog.trailofbits.com/2019/11/11/test-case-reduction/

bbaudry commented 4 years ago

Netflix's repulsive grizzly for Application Layer DoS Testing https://github.com/netflix-skunkworks/repulsive-grizzly

matsskoglunds commented 4 years ago

OWASP https://www.owasp.org/

JFrog Xray is an application security SCA tool that integrates security directly into your DevOps workflows, https://jfrog.com/xray/

bbaudry commented 4 years ago

What DevOps Means for Risk Management https://cloudacademy.com/blog/what-devops-means-for-risk-management/

rarkins commented 4 years ago

Open Source Security: https://www.whitesourcesoftware.com/open-source-security/ The Next Generation of DevOps Adds Security into the Blend: https://resources.whitesourcesoftware.com/blog-whitesource/next-generation-devops

monperrus commented 3 years ago

Hacking into Google's Network for $133,337 (keywords: Remote Code Execution / Google Cloud Deployment Manager ) https://www.ezequiel.tech/2020/05/rce-in-cloud-dm.html

monperrus commented 3 years ago

Nist DevSecOps Documents https://csrc.nist.gov/Projects/devsecops/publications

rarkins commented 3 years ago

FACT SHEET: President Signs Executive Order Charting New Course to Improve the Nation’s Cybersecurity and Protect Federal Government Networks

monperrus commented 3 years ago

The Linux Foundation created Sigstore to provide free certificates and tools to automate and verify signatures of software components, to defend software supply chain attacks. http://sigstore.dev

mrbgco commented 2 years ago

An overview of the DevSecOps world.

monperrus commented 2 years ago

The Dance Dance Authentication Scheme https://m.youtube.com/watch?v=VgC4b9K-gYU

bbaudry commented 2 years ago

Software of unknown pedigree https://en.wikipedia.org/wiki/Software_of_unknown_pedigree

monperrus commented 2 years ago

Mozilla Sops: Simple and flexible tool for managing secrets, encrypted files that supports YAML, JSON, ENV, INI and BINARY formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, age, and PGP. https://github.com/mozilla/sops

bbaudry commented 2 years ago

Monitoring the Software Supply Chain with Azure Sentinel https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/monitoring-the-software-supply-chain-with-azure-sentinel/ba-p/2176463

monperrus commented 2 years ago

Lacework is a startup company doing:

https://www.lacework.com

bbaudry commented 2 years ago

Securing your software supply chain, by Github https://docs.github.com/en/code-security/supply-chain-security

monperrus commented 2 years ago

Open Source Security Foundation https://openssf.org/

bbaudry commented 2 years ago

OWASP ZAP zed attack proxy https://www.zaproxy.org/

monperrus commented 2 years ago

FYI, added https://en.wikipedia.org/wiki/Dynamic_application_security_testing to the reference list of wikipedia pages at the top.

monperrus commented 2 years ago

Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies IEEE TSE 2022

bbaudry commented 2 years ago

signing, verifying and protecting software https://www.sigstore.dev/

bbaudry commented 2 years ago

It’s Time to Get Hip to the SBOM https://jfrog.com/blog/its-time-to-get-hip-to-the-sbom/

bbaudry commented 2 years ago

Software Supply Chain Best Practices - Linux Foundation