KTH / devops-course

Repository of the DevOps course at KTH Royal Institute of Technology DD2482
191 stars 427 forks source link

DevOps and Security - DevSecOps #18

Open monperrus opened 6 years ago

monperrus commented 6 years ago

Wikipedia references:

matsskoglund commented 2 years ago

https://docs.gitlab.com/ee/user/application_security/dependency_list/

monperrus commented 2 years ago

What are the Practices for Secret Management in Software Artifacts?. (arXiv:2208.11280v1 [cs.SE])

bbaudry commented 2 years ago

The steady project addresses the OWASP Top 10 security risk A9, Using Components with Known Vulnerabilities https://projects.eclipse.org/projects/technology.

monperrus commented 2 years ago

Security support in continuous deployment pipeline

monperrus commented 2 years ago

Exploiting devops practices for dependable and secure continuous delivery pipelines

monperrus commented 2 years ago

Vulnerabilities in continuous delivery pipelines? A case study

monperrus commented 2 years ago

SpiceDB is a open source Zanzibar-inspired database that stores, computes, and validates fine grained permissions. https://authzed.com/spicedb/

monperrus commented 2 years ago

https://github.com/codenotary/cas

cas detects or acts on the following (but not limited to):

  • Immutable tagging of source code, builds, and container images with version number, owner, timestamp, organization, trust level, and much more
  • Simple and tamper-proof extraction of notarized tags like version number, owner, timestamp, organization, and trust level from any source code, build and container (based on the related image)
  • Quickly discover and identify untrusted, revoked or obsolete libraries, builds, and containers in your application
  • Detect the launch of an authorized or unknown container immediately
  • Prevent untrusted or revoked containers from starting in production
  • Verify the integrity and the publisher of all the data received over any channel

and more

  • Enable application version checks and actions
  • Buggy or rogue libraries can be traced by simple revoke or unsupport
  • Revoke or unsupport your build or build version post-deployment (no complex certificate revocation that includes delivery of newly signed builds)
  • Stop unwanted containers from being launched
  • Make revocation part of the remediation process
  • Use revocation without impairing customer environments
  • Trace source code to build to deployment by integration into CI/CD or manual workflow
  • Tag your applications for specific use cases (alpha, beta - non-commercial aso).
monperrus commented 1 year ago

Google Cloud Key Management https://cloud.google.com/security-key-management

monperrus commented 1 year ago

OWASP Top 10 CI/CD Security Risks https://owasp.org/www-project-top-10-ci-cd-security-risks/

monperrus commented 1 year ago

Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms 43rd Ieee Symposium On Security And Privacy (Sp 2022) https://www.xiaojingliao.com/uploads/9/7/0/2/97024238/sp22-devops.pdf

monperrus commented 1 year ago
bbaudry commented 1 year ago

fuzzing curl cli https://blog.trailofbits.com/2023/02/14/curl-audit-fuzzing-libcurl-command-line-interface/

monperrus commented 1 year ago

SoK: run-time security for cloud microservices. Are we there yet?.

bbaudry commented 1 year ago

A Static Analysis Platform for Investigating Security Trends in Repositories. http://arxiv.org/abs/2304.01725

monperrus commented 1 year ago

securing the software supply chain with optimized containers specific to your application needs, while automatically reducing vulnerabilities in the process.

https://slim.ai

monperrus commented 1 year ago

Reverse Engineering the Tesla Firmware Update Process https://www.pentestpartners.com/security-blog/reverse-engineering-the-tesla-firmware-update-process/

bbaudry commented 1 year ago

Scan (skæn) is an open-source security audit tool for modern DevOps teams https://appthreat.com/en/latest/

monperrus commented 1 year ago

Bitwarden Secrets Manager enables developers, DevOps, and cybersecurity teams to centrally store, manage, and deploy secrets at scale.

https://bitwarden.com/help/secrets-manager-overview/

bbaudry commented 1 year ago

GitGuardian is a developer-first solution scanning GitHub activity in real-time for API secret tokens, database credentials https://github.com/GitGuardian

monperrus commented 1 year ago

Detecting intrusion with canary tokens A canary token is a resource that is monitored for access or tampering. Usually, canary tokens come in the form of a URL, file, API key, or email, etc., and trigger alerts whenever someone (presumably an attacker) trips over them.

https://github.com/GitGuardian/ggcanary

monperrus commented 1 year ago

µDetector: Automated Intrusion Detection for Microservices. SANER 23

bbaudry commented 1 year ago

Securing the Supply Chain for Your Java Applications By Thomas Vitale. Devoxx 2023 https://www.youtube.com/watch?v=ftPFxK8JPNM

bbaudry commented 6 months ago

Where does your software (really) come from? https://github.blog/2024-04-30-where-does-your-software-really-come-from/

monperrus commented 3 months ago

Azure Sentinel Security analytics for Azure https://github.com/Azure/Azure-Sentinel

monperrus commented 2 months ago

poutine is a security scanner that detects misconfigurations and vulnerabilities in the build pipelines of a repository https://github.com/boostsecurityio/poutine/

monperrus commented 2 months ago

docker-bench: checks for dozens of common best-practices around deploying Docker containers in production https://github.com/docker/docker-bench-security

sofiabobadilla commented 1 month ago

Coana https://www.coana.tech/

Coana's SCA with Reachability Analysis allows you to safely disregard unreachable vulnerabilities and easily patch the ones that matter.