SlideShare a Scribd company logo
1 of 29
© 2019 Synopsys, Inc.1
AppSec Hype or Reality?
Demystifying Interactive Application Security Test (IAST)
Asma Zubair and Kimm Yeo
SIG Product Management and Marketing
© 2019 Synopsys, Inc.2
Agenda
Market trends and challenges
AppSec landscape and IAST
Introducing Seeker IAST
Seeker demonstration
Q & A
© 2019 Synopsys, Inc.3
The pace of digital transformation today
Source: Accenture 2019 technology vision study
94%enterprises have accelerated or
significantly accelerated pace of innovations
© 2019 Synopsys, Inc.4
What’s next?
One of the top five technology trends for next three years
Increased risks and complexity
Enterprises are not just potential
victims, but others’ vectors
Importance of cybersecurity
One of top 5 trends for next 3years
source: Accenture 2019 Technology Vision survey with over 6k business and IT execs
© 2019 Synopsys, Inc.5
The pace of digital transformation today
Increased risks and complexity
Enterprises are not just potential
victims, but others’ vectors
Source: Accenture 2019 Technology Vision survey
with over 6k business and IT execs
With digital transformation becoming an even playing field, businesses recognize:
© 2019 Synopsys, Inc.6
Current state of cybersecurity
What does cybersecurity
look like today?
close to 50%
businesses store sensitive
data in the cloud 4
67%
security decision makers
believed app security is a
critical high priority
75%
leverage CI/CD for
automation 5
49%
of development lack time
for security testing
Only 23%
have security automation
as part of CI/CD 5
90%
of IT uses open source
software 2
60%
of codebases contain at
least one vulnerability and
license conflicts 2
79%
vectors for breaches:
web apps & software
vulnerability
11B
records breached 1
(and still counting...)
up 5% in last 8 months
Sources:
1. Privacy rights data breaches (link)
2. 2019 Open source security and risk analysis report
3. 2019 Verizon data breach investigation report
4. 2019 SANS cloud security survey results
5. 2018 DevOps and Jenkins community report
© 2019 Synopsys, Inc.7
AppSec tools landscape
© 2019 Synopsys, Inc.8
Data / Systems / Services
Application Behavior
(business logic, configuration, etc.)
Frameworks
Proprietary Code
OSS OSS OSS OSS
OSS OSS OSS
User Interface and APIs
How can our
developers produce
code with fewer
defects and security
weaknesses (CWEs)
without slowing down?
How do we track an
manage open source
use and the security
and license compliance
risks that come with it?
How do we verify that we’ve addressed exploitable
vulnerabilities and data protection issues before
and after deployment?
Finds security defects
in proprietary code:
- SQL injection
- Cross-site scripting
- Buffer overflows, etc.
Static Analysis
Finds open source
component risks:
- Known vulns
- Hidden dependencies
- New vuln alerts
Software Comp
Analysis
Finds vulnerable app behavior:
- Configuration & Authorization issues
- Data leakage
- Business logic flaws
Dynamic Analysis
© 2019 Synopsys, Inc.9
Building a secure SDLC toolchain
Code
development
Code commit Build Test Deploy
Production
Release
SCA, SAST,
(Deeper level)
Lightweight IDE
SAST tools
Monitoring
Pen testing
Red Teaming
TM, SAST
Manual code
review
DAST
Fuzz testing
Pen testing
Load/Performance test
Hardening checks
© 2019 Synopsys, Inc.10
Building secure software
is more challenging than ever
Languages
Frameworks
Open Source
Agile
CI/CD
DevOps
Web/Mobile
Containers
Cloud
© 2019 Synopsys, Inc.11
The challenges of building security into modern
application development and delivery
How do we integrate and
automate dynamic security
testing into our CI/CD?
How do we identify
and prioritize the most
severe vulnerabilities?
How do we minimize
the effort for developers
to find and fix
vulnerabilities?
How do we maximize
application security
AND
development velocity?
Sec
© 2019 Synopsys, Inc.12
Interactive Application Security Testing (IAST)
© 2019 Synopsys, Inc.13
Build continuous security into SDLC
How do you take siloed, disparate development, operations and
security processes and transform to an integrated tool chain?
Code
development
Code commit Build Test Deploy
Production
Release
Functional
Non- FunctionalSCA, SAST,
(Deeper level)
IAST
(Continuous run-time
text)
Lightweight IDE
SAST tools
DAST
Fuzz testing
Pen testing
Load/Performance test
Hardening checks
Monitoring
Pen testing
Red Teaming
IAST
(Continuous runtime
test)
TM, SAST
Manual code
review
© 2019 Synopsys, Inc.14
IAST runtime testing & analysis
• Analysis of code execution using runtime monitors
• Visibility into executed code and runtime data,
such as:
• HTTP Requests – End to End
• Parameter Propagation
• HTTP Response Writing
• Database Calls
• Database Responses
• File System Calls (& Content)
• String Manipulations
• Memory (Like Debugger “Watch”)
• Usage of 3rd Party Libraries
• Web Services Calls
• On-the-fly Code Generation
• More…
…
© 2019 Synopsys, Inc.15
Comparison of SAST, IAST, and DAST
SAST IAST DAST
Typically used in Development Integration and QA QA or production
Usually requires Source code Functional app and test
suite
Functional app
Integrates in CI/CD Yes Yes No, not really
Capabilities • Finds vulnerabilities
earliest in the SDLC
• Gives fast line of code
insights
• Finds vulnerabilities
during functional test
(no scans required)
• Gives runtime and line
of code insights in real
time
• Finds vulnerabilities
w/o source code or
test suite
• Requires expertise
and time to triage and
prioritize findings
© 2019 Synopsys, Inc.16
Introducing Seeker IAST
© 2019 Synopsys, Inc.17
Seeker
Seeker is our interactive application security testing tool
– Performs run time security testing
Seeker performs security testing on:
– Web apps
– Web APIs, or services
– Mobile application back-end (where a mobile app’s critical functionality
resides)
– Detects vulnerabilities in custom code as well as 3rd party code
Applications can be:
– on-premises, in the cloud, containerized
Seeker detects
– Injection flaws
– Security misconfigurations
– Sensitive data leakage
– and many more types of vulnerabilities
© 2019 Synopsys, Inc.18
Seeker - Automated security testing made easy
• Automatically verifies
vulnerabilities
• Creates specific Jira
tickets for developers
• Instant notification to
developers via slack or
email
Automated
Verification
Easy for Development
• ANY functional test
becomes a security test
• Continuous security testing
with results in real time
Automated
Testing
Easy for QA
• Deploy and run
via CI/CD
• Compatible with existing
automation tools
• On-premises and cloud-
based apps
Automated
Deployment
Easy for DevOps
© 2019 Synopsys, Inc.19
http://...
How Seeker works
Your
Application
Seeker Enterprise
Server
vulnerabilities
2
3
1 Application receives
HTTP request.
Agent analyzes code and
memory, focusing on
security-related activities
like encryption, SQL, file
access, LDAP, XPath, etc.
Results are actively
verified and reported
along with vulnerable lines
of code, runtime data, and
verification proof.
2
3
1
Seeker
Agent
© 2019 Synopsys, Inc.20
Seeker integrates seamlessly into the DevOps toolchain
Connect directly to Jira and your CI/CD tools with APIs and integrations
testcode operatebuild deploy
Developer
commits
the code
Functional
testing done
Build pass/fail
decision
(based on testing status)
App and Seeker
are deployed in
test environment
The build
is made
Vulnerabilities
pushed in
© 2019 Synopsys, Inc.21
Active verification ensures accurate results
Patented active verification engine minimizes false positives
• Automatically re-tests detected
vulnerabilities to verify that they
are real and can be exploited
• Quickly processes hundreds of
thousands of HTTP(S) requests
• Provides risk-prioritized list of verified
vulnerabilities to fix immediately
© 2019 Synopsys, Inc.22
Configurable sensitive data tracking
• Define parameters and patterns to identify
sensitive data in your application
• Track exposure and leakage through URLs,
logs, UI, DB, etc.
• Verify compliance with standards including
PCI, HIPAA, and GDPR
Verify security and data protection compliance by tracking leakage of any type of sensitive data
© 2019 Synopsys, Inc.23
Integrated eLearning
• Seeker is now integrated with Synopsys eLearning.
– Requires eLearning account/contract
• Contextual online training helps developers
understand and remediate vulnerabilities.
© 2019 Synopsys, Inc.24
Insight into open source use and risks
• Get visibility into supply chain risks
• Comprehensive bill of materials
• Vulnerable components
• Risk-ranked vulnerabilities
• Open source licenses
Integrated Binary Software Composition Analysis identifies vulnerable components used in code
© 2019 Synopsys, Inc.25
Seeker In Action
Demonstration
© 2019 Synopsys, Inc.30
Why Seeker ?
Designed for seamless integration
• Easy to automate or integrate into CI/CD pipeline
• Easy to deploy and configure
• Optimized for security, development and DevOps teams
Privacy and compliance
• Only AST tools with complete sensitive data tracking
• Provide results in compliance with OWASP Top 10, PCI DSS, GDPR, CAPEC
• Integrated Binary Software Composition Analysis for OSS dependencies
Developer empowerment
• Accurate findings with real time verification to help prioritize remediation
• Integrated eLearning with contextual learning on the job
• Instant alert (slack, email, webhooks) and remediation advice
Designed for scale
• Support large-scale, modern app deployments
• Framework agnostic with broad language coverage
• Comprehensive checkers
© 2019 Synopsys, Inc.31
Seeker helps organizations with their application security testing needs
No security testing
in place
• Seeker is perfect
as a starting tool for
automated security testing
• Security expertise
not needed
Ad-hoc security testing
Start using Seeker
during functional testing
to find vulnerabilities
early and cut down
on pen-testing
resources/cost
Ready to integrate
security in CI/CD
Integrate Seeker in
CI/CD pipeline and
automatically fail the
build if critical security
vulnerabilities are
detected
Regardless of their maturity in application security risk management process
© 2019 Synopsys, Inc.32
Q & A
Thank You
Follow us on twitter :
@zubaira, @kimm_yeo

More Related Content

What's hot

What's hot (20)

Webinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilitiesWebinar–5 ways to risk rank your vulnerabilities
Webinar–5 ways to risk rank your vulnerabilities
 
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created EqualWebinar–Why All Open Source Scans Aren't Created Equal
Webinar–Why All Open Source Scans Aren't Created Equal
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability FeedWebinar–Delivering a Next Generation Vulnerability Feed
Webinar–Delivering a Next Generation Vulnerability Feed
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 
Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security Webinar–Using Evidence-Based Security
Webinar–Using Evidence-Based Security
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
 
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
 
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software AssetsWebinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & VeracodeCrafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
 

Similar to Webinar–AppSec: Hype or Reality

Similar to Webinar–AppSec: Hype or Reality (20)

Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
The new developer experience
The new developer experienceThe new developer experience
The new developer experience
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
 
InterConnect 2017 : Cognitive DevOps: Get Rid of the Guesswork to Improve Sof...
InterConnect 2017 : Cognitive DevOps: Get Rid of the Guesswork to Improve Sof...InterConnect 2017 : Cognitive DevOps: Get Rid of the Guesswork to Improve Sof...
InterConnect 2017 : Cognitive DevOps: Get Rid of the Guesswork to Improve Sof...
 
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
 
Code to Release using Artificial Intelligence and Machine Learning
Code to Release using Artificial Intelligence and Machine LearningCode to Release using Artificial Intelligence and Machine Learning
Code to Release using Artificial Intelligence and Machine Learning
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset  Application Security Testing for a DevOps Mindset
Application Security Testing for a DevOps Mindset
 
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
 
Outpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24 webinar - Api security
Outpost24 webinar - Api security
 
Webinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript ApplicationsWebinar–Reviewing Modern JavaScript Applications
Webinar–Reviewing Modern JavaScript Applications
 

More from Synopsys Software Integrity Group

More from Synopsys Software Integrity Group (13)

Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?Webinar–Segen oder Fluch?
Webinar–Segen oder Fluch?
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions Webinar–The State of Open Source in M&A Transactions
Webinar–The State of Open Source in M&A Transactions
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde AgileWebinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
 
Webinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and AbuseWebinar – Security Tool Misconfiguration and Abuse
Webinar – Security Tool Misconfiguration and Abuse
 
Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity Webinar – Software Security 2019–Embrace Velocity
Webinar – Software Security 2019–Embrace Velocity
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar – Using Metrics to Drive Your Software Security Initiative
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
Infographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPRInfographic–A Look Back at the First Year of GDPR
Infographic–A Look Back at the First Year of GDPR
 
Webinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis ReportWebinar–2019 Open Source Risk Analysis Report
Webinar–2019 Open Source Risk Analysis Report
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 

Recently uploaded

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Recently uploaded (20)

OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 

Webinar–AppSec: Hype or Reality

  • 1. © 2019 Synopsys, Inc.1 AppSec Hype or Reality? Demystifying Interactive Application Security Test (IAST) Asma Zubair and Kimm Yeo SIG Product Management and Marketing
  • 2. © 2019 Synopsys, Inc.2 Agenda Market trends and challenges AppSec landscape and IAST Introducing Seeker IAST Seeker demonstration Q & A
  • 3. © 2019 Synopsys, Inc.3 The pace of digital transformation today Source: Accenture 2019 technology vision study 94%enterprises have accelerated or significantly accelerated pace of innovations
  • 4. © 2019 Synopsys, Inc.4 What’s next? One of the top five technology trends for next three years Increased risks and complexity Enterprises are not just potential victims, but others’ vectors Importance of cybersecurity One of top 5 trends for next 3years source: Accenture 2019 Technology Vision survey with over 6k business and IT execs
  • 5. © 2019 Synopsys, Inc.5 The pace of digital transformation today Increased risks and complexity Enterprises are not just potential victims, but others’ vectors Source: Accenture 2019 Technology Vision survey with over 6k business and IT execs With digital transformation becoming an even playing field, businesses recognize:
  • 6. © 2019 Synopsys, Inc.6 Current state of cybersecurity What does cybersecurity look like today? close to 50% businesses store sensitive data in the cloud 4 67% security decision makers believed app security is a critical high priority 75% leverage CI/CD for automation 5 49% of development lack time for security testing Only 23% have security automation as part of CI/CD 5 90% of IT uses open source software 2 60% of codebases contain at least one vulnerability and license conflicts 2 79% vectors for breaches: web apps & software vulnerability 11B records breached 1 (and still counting...) up 5% in last 8 months Sources: 1. Privacy rights data breaches (link) 2. 2019 Open source security and risk analysis report 3. 2019 Verizon data breach investigation report 4. 2019 SANS cloud security survey results 5. 2018 DevOps and Jenkins community report
  • 7. © 2019 Synopsys, Inc.7 AppSec tools landscape
  • 8. © 2019 Synopsys, Inc.8 Data / Systems / Services Application Behavior (business logic, configuration, etc.) Frameworks Proprietary Code OSS OSS OSS OSS OSS OSS OSS User Interface and APIs How can our developers produce code with fewer defects and security weaknesses (CWEs) without slowing down? How do we track an manage open source use and the security and license compliance risks that come with it? How do we verify that we’ve addressed exploitable vulnerabilities and data protection issues before and after deployment? Finds security defects in proprietary code: - SQL injection - Cross-site scripting - Buffer overflows, etc. Static Analysis Finds open source component risks: - Known vulns - Hidden dependencies - New vuln alerts Software Comp Analysis Finds vulnerable app behavior: - Configuration & Authorization issues - Data leakage - Business logic flaws Dynamic Analysis
  • 9. © 2019 Synopsys, Inc.9 Building a secure SDLC toolchain Code development Code commit Build Test Deploy Production Release SCA, SAST, (Deeper level) Lightweight IDE SAST tools Monitoring Pen testing Red Teaming TM, SAST Manual code review DAST Fuzz testing Pen testing Load/Performance test Hardening checks
  • 10. © 2019 Synopsys, Inc.10 Building secure software is more challenging than ever Languages Frameworks Open Source Agile CI/CD DevOps Web/Mobile Containers Cloud
  • 11. © 2019 Synopsys, Inc.11 The challenges of building security into modern application development and delivery How do we integrate and automate dynamic security testing into our CI/CD? How do we identify and prioritize the most severe vulnerabilities? How do we minimize the effort for developers to find and fix vulnerabilities? How do we maximize application security AND development velocity? Sec
  • 12. © 2019 Synopsys, Inc.12 Interactive Application Security Testing (IAST)
  • 13. © 2019 Synopsys, Inc.13 Build continuous security into SDLC How do you take siloed, disparate development, operations and security processes and transform to an integrated tool chain? Code development Code commit Build Test Deploy Production Release Functional Non- FunctionalSCA, SAST, (Deeper level) IAST (Continuous run-time text) Lightweight IDE SAST tools DAST Fuzz testing Pen testing Load/Performance test Hardening checks Monitoring Pen testing Red Teaming IAST (Continuous runtime test) TM, SAST Manual code review
  • 14. © 2019 Synopsys, Inc.14 IAST runtime testing & analysis • Analysis of code execution using runtime monitors • Visibility into executed code and runtime data, such as: • HTTP Requests – End to End • Parameter Propagation • HTTP Response Writing • Database Calls • Database Responses • File System Calls (& Content) • String Manipulations • Memory (Like Debugger “Watch”) • Usage of 3rd Party Libraries • Web Services Calls • On-the-fly Code Generation • More… …
  • 15. © 2019 Synopsys, Inc.15 Comparison of SAST, IAST, and DAST SAST IAST DAST Typically used in Development Integration and QA QA or production Usually requires Source code Functional app and test suite Functional app Integrates in CI/CD Yes Yes No, not really Capabilities • Finds vulnerabilities earliest in the SDLC • Gives fast line of code insights • Finds vulnerabilities during functional test (no scans required) • Gives runtime and line of code insights in real time • Finds vulnerabilities w/o source code or test suite • Requires expertise and time to triage and prioritize findings
  • 16. © 2019 Synopsys, Inc.16 Introducing Seeker IAST
  • 17. © 2019 Synopsys, Inc.17 Seeker Seeker is our interactive application security testing tool – Performs run time security testing Seeker performs security testing on: – Web apps – Web APIs, or services – Mobile application back-end (where a mobile app’s critical functionality resides) – Detects vulnerabilities in custom code as well as 3rd party code Applications can be: – on-premises, in the cloud, containerized Seeker detects – Injection flaws – Security misconfigurations – Sensitive data leakage – and many more types of vulnerabilities
  • 18. © 2019 Synopsys, Inc.18 Seeker - Automated security testing made easy • Automatically verifies vulnerabilities • Creates specific Jira tickets for developers • Instant notification to developers via slack or email Automated Verification Easy for Development • ANY functional test becomes a security test • Continuous security testing with results in real time Automated Testing Easy for QA • Deploy and run via CI/CD • Compatible with existing automation tools • On-premises and cloud- based apps Automated Deployment Easy for DevOps
  • 19. © 2019 Synopsys, Inc.19 http://... How Seeker works Your Application Seeker Enterprise Server vulnerabilities 2 3 1 Application receives HTTP request. Agent analyzes code and memory, focusing on security-related activities like encryption, SQL, file access, LDAP, XPath, etc. Results are actively verified and reported along with vulnerable lines of code, runtime data, and verification proof. 2 3 1 Seeker Agent
  • 20. © 2019 Synopsys, Inc.20 Seeker integrates seamlessly into the DevOps toolchain Connect directly to Jira and your CI/CD tools with APIs and integrations testcode operatebuild deploy Developer commits the code Functional testing done Build pass/fail decision (based on testing status) App and Seeker are deployed in test environment The build is made Vulnerabilities pushed in
  • 21. © 2019 Synopsys, Inc.21 Active verification ensures accurate results Patented active verification engine minimizes false positives • Automatically re-tests detected vulnerabilities to verify that they are real and can be exploited • Quickly processes hundreds of thousands of HTTP(S) requests • Provides risk-prioritized list of verified vulnerabilities to fix immediately
  • 22. © 2019 Synopsys, Inc.22 Configurable sensitive data tracking • Define parameters and patterns to identify sensitive data in your application • Track exposure and leakage through URLs, logs, UI, DB, etc. • Verify compliance with standards including PCI, HIPAA, and GDPR Verify security and data protection compliance by tracking leakage of any type of sensitive data
  • 23. © 2019 Synopsys, Inc.23 Integrated eLearning • Seeker is now integrated with Synopsys eLearning. – Requires eLearning account/contract • Contextual online training helps developers understand and remediate vulnerabilities.
  • 24. © 2019 Synopsys, Inc.24 Insight into open source use and risks • Get visibility into supply chain risks • Comprehensive bill of materials • Vulnerable components • Risk-ranked vulnerabilities • Open source licenses Integrated Binary Software Composition Analysis identifies vulnerable components used in code
  • 25. © 2019 Synopsys, Inc.25 Seeker In Action Demonstration
  • 26. © 2019 Synopsys, Inc.30 Why Seeker ? Designed for seamless integration • Easy to automate or integrate into CI/CD pipeline • Easy to deploy and configure • Optimized for security, development and DevOps teams Privacy and compliance • Only AST tools with complete sensitive data tracking • Provide results in compliance with OWASP Top 10, PCI DSS, GDPR, CAPEC • Integrated Binary Software Composition Analysis for OSS dependencies Developer empowerment • Accurate findings with real time verification to help prioritize remediation • Integrated eLearning with contextual learning on the job • Instant alert (slack, email, webhooks) and remediation advice Designed for scale • Support large-scale, modern app deployments • Framework agnostic with broad language coverage • Comprehensive checkers
  • 27. © 2019 Synopsys, Inc.31 Seeker helps organizations with their application security testing needs No security testing in place • Seeker is perfect as a starting tool for automated security testing • Security expertise not needed Ad-hoc security testing Start using Seeker during functional testing to find vulnerabilities early and cut down on pen-testing resources/cost Ready to integrate security in CI/CD Integrate Seeker in CI/CD pipeline and automatically fail the build if critical security vulnerabilities are detected Regardless of their maturity in application security risk management process
  • 28. © 2019 Synopsys, Inc.32 Q & A
  • 29. Thank You Follow us on twitter : @zubaira, @kimm_yeo