SlideShare una empresa de Scribd logo
1 de 19
Design, develop, deploy and run
secure applications​
Mark Harrison – Microsoft, Azure AppDev Specialist
Nick Liffen – GitHub, Security Specialist
Agenda Application security fundamentals
GitHub Advanced Security capabilities
Information Security
Confidentiality, integrity and
availability are the basic concepts
and at the core of infosec efforts
Protect applications and
associated data
Attackers – internal / external
Accidents / incompetence
Natural disasters
Cybercrime
Huge industry
Attacker’s Advantage…
…and Defender’s dilemma
Attacker only needs one weak point
Attacker can probe for unknown vulnerabilities
Attacker can strike at will
Attacker can play dirty
Defender must defend all points
Defender must defend against known attacks
Defender must be constantly vigilant
Defender must play by the rules
There are huge numbers of attackers
Risk Management
Identify Risks
Likelihood of being exercised
Impact that it will cause
Address risk:
Avoid
Mitigate
Transfer
Accept
Reduce risks by:
Secure by design
Secure the code
Secure the environment
Secure the operations
Secure the App
Secure by Design
Threat Modeling
Zero Trust
User least privileged access
Verify explicitly
Assume breach
Identity
Data Classification
Transport & Storage
Secure the Code Secure the Environment Secure the Operations
Secure the App
Secure by Design Secure the Code
Secret Management
Code Management
Code Quality
Dependency Management
Static Analysis
Secure the Environment Secure the Operations
Secure the App
Secure by Design Secure the Code Secure the Environment
Policies
Infrastructure as code
Access Controls
Network
OS Patching
Secure the Operations
Secure the App
Secure by Design Secure the Code Secure the Environment Secure the Operations
Monitoring
Telemetry & Audits
Incident Management
Forensics
Threat intelligence
Disaster Recovery
Secure the App
Secure by Design Secure the Code Secure the Environment Secure the Operations
Automation where possible - Embrace everything-as-code
Software Supply Chain
Open Source
Potentially many levels of dependencies resulting in a lot
of software being used from unknown sources
Dependency Risks
Software vulnerabilities – what flaws/bugs have you
inherited into your application?
New version – is it compatible with your application?
Licensing constraints – it is allowed for commercial use?
What must you share back?
Understand your SBOM (Software Bill
of Materials)
Software Composition Analysis tools
DevOps
Driving innovation – reduce time to value
Develop, deploy and improve products at a
faster pace than they can with traditional
software development approaches
The union of people, process, and products
to enable continuous delivery of value
Production
Development
Develop
+Test
Monitor
+ learn
Collaboration
Plan
Build + Release
Requirements /
Work Items
Security
Shift Left
DevSecOps
Security practises should be automated and
baked into DevOps in a pervasive manner
Shift left – introduce security earlier into the
dev lifecycle
Security first culture
Production
Development
Develop
+Test
Monitor
+ learn
Collaboration
Plan
Build + Release
Requirements /
Work Items
GitHub Advanced Security capabilities
GitHub Code Scanning
The interrogatable tool that provides the world
class developer experience developers expect when
it comes to consuming security & quality alerts
CodeQL
CodeQL is the analysis engine used by developers
to automate security checks, and by security
researchers to perform variant analysis
GitHub Secret Scanning
Automatic notifications of any API tokens or other
secrets exposed anywhere in your git history
GitHub Security Overview
A single pane of glass for everything security in,
and out of GitHub
GitHub Supply Chain (Dependency Review)
Dependency review helps you understand
dependency changes and the security impact of
these changes at every pull request. It provides an
easily understandable visualization of dependency
changes with a rich diff on the "Files Changed" tab
of a pull request
GitHub Advanced Security capabilities
Demo Time
Resources
Session specific resources
Azure Security Documentation​
👉https://aka.ms/build/uk/azure-security
GitHub Security
👉https://aka.ms/build/uk/github-security
General learning resources
Microsoft Learn
👉 https://aka.ms/build/uk/learn
Microsoft Docs
👉 https://aka.ms/build/uk/docs
Microsoft Build Cloud Skills Challenge​
👉 https://aka.ms/build/uk/csc
Microsoft Certifications​
👉 https://aka.ms/build/uk/certs
Microsoft UK Training Days​
👉 https://aka.ms/build/uk/training
Microsoft UK Developer Hub​
👉 https://aka.ms/build/uk/developers
Microsoft UK Community Map​
👉 https://aka.ms/build/uk/community
Thank you
mark.harrison@microsoft.com
nickliffen@github.com
© Copyright Microsoft Corporation. All rights reserved.
Securing Applications

Más contenido relacionado

Similar a Securing Applications

Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff WilliamsDevSecCon
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps WhiteSource
 
Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Achim D. Brucker
 
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfSteven Carlson
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an IntroductionPrashanth B. P.
 

Similar a Securing Applications (20)

Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff Williams
 
Product Security
Product SecurityProduct Security
Product Security
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Introduction to Application Security Testing
Introduction to Application Security TestingIntroduction to Application Security Testing
Introduction to Application Security Testing
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
 
DevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docxDevSecOps – The Importance of DevOps Security in 2023.docx
DevSecOps – The Importance of DevOps Security in 2023.docx
 
Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...
 
The Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docxThe Importance of DevOps Security in 2023.docx
The Importance of DevOps Security in 2023.docx
 
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdf
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
DevSecOps : an Introduction
DevSecOps : an IntroductionDevSecOps : an Introduction
DevSecOps : an Introduction
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Securing Applications

  • 1. Design, develop, deploy and run secure applications​ Mark Harrison – Microsoft, Azure AppDev Specialist Nick Liffen – GitHub, Security Specialist
  • 2. Agenda Application security fundamentals GitHub Advanced Security capabilities
  • 3. Information Security Confidentiality, integrity and availability are the basic concepts and at the core of infosec efforts Protect applications and associated data Attackers – internal / external Accidents / incompetence Natural disasters
  • 4. Cybercrime Huge industry Attacker’s Advantage… …and Defender’s dilemma Attacker only needs one weak point Attacker can probe for unknown vulnerabilities Attacker can strike at will Attacker can play dirty Defender must defend all points Defender must defend against known attacks Defender must be constantly vigilant Defender must play by the rules There are huge numbers of attackers
  • 5. Risk Management Identify Risks Likelihood of being exercised Impact that it will cause Address risk: Avoid Mitigate Transfer Accept Reduce risks by: Secure by design Secure the code Secure the environment Secure the operations
  • 6. Secure the App Secure by Design Threat Modeling Zero Trust User least privileged access Verify explicitly Assume breach Identity Data Classification Transport & Storage Secure the Code Secure the Environment Secure the Operations
  • 7. Secure the App Secure by Design Secure the Code Secret Management Code Management Code Quality Dependency Management Static Analysis Secure the Environment Secure the Operations
  • 8. Secure the App Secure by Design Secure the Code Secure the Environment Policies Infrastructure as code Access Controls Network OS Patching Secure the Operations
  • 9. Secure the App Secure by Design Secure the Code Secure the Environment Secure the Operations Monitoring Telemetry & Audits Incident Management Forensics Threat intelligence Disaster Recovery
  • 10. Secure the App Secure by Design Secure the Code Secure the Environment Secure the Operations Automation where possible - Embrace everything-as-code
  • 11. Software Supply Chain Open Source Potentially many levels of dependencies resulting in a lot of software being used from unknown sources Dependency Risks Software vulnerabilities – what flaws/bugs have you inherited into your application? New version – is it compatible with your application? Licensing constraints – it is allowed for commercial use? What must you share back? Understand your SBOM (Software Bill of Materials) Software Composition Analysis tools
  • 12. DevOps Driving innovation – reduce time to value Develop, deploy and improve products at a faster pace than they can with traditional software development approaches The union of people, process, and products to enable continuous delivery of value Production Development Develop +Test Monitor + learn Collaboration Plan Build + Release Requirements / Work Items
  • 13. Security Shift Left DevSecOps Security practises should be automated and baked into DevOps in a pervasive manner Shift left – introduce security earlier into the dev lifecycle Security first culture Production Development Develop +Test Monitor + learn Collaboration Plan Build + Release Requirements / Work Items
  • 14. GitHub Advanced Security capabilities GitHub Code Scanning The interrogatable tool that provides the world class developer experience developers expect when it comes to consuming security & quality alerts CodeQL CodeQL is the analysis engine used by developers to automate security checks, and by security researchers to perform variant analysis GitHub Secret Scanning Automatic notifications of any API tokens or other secrets exposed anywhere in your git history GitHub Security Overview A single pane of glass for everything security in, and out of GitHub GitHub Supply Chain (Dependency Review) Dependency review helps you understand dependency changes and the security impact of these changes at every pull request. It provides an easily understandable visualization of dependency changes with a rich diff on the "Files Changed" tab of a pull request
  • 15. GitHub Advanced Security capabilities Demo Time
  • 16. Resources Session specific resources Azure Security Documentation​ 👉https://aka.ms/build/uk/azure-security GitHub Security 👉https://aka.ms/build/uk/github-security General learning resources Microsoft Learn 👉 https://aka.ms/build/uk/learn Microsoft Docs 👉 https://aka.ms/build/uk/docs Microsoft Build Cloud Skills Challenge​ 👉 https://aka.ms/build/uk/csc Microsoft Certifications​ 👉 https://aka.ms/build/uk/certs Microsoft UK Training Days​ 👉 https://aka.ms/build/uk/training Microsoft UK Developer Hub​ 👉 https://aka.ms/build/uk/developers Microsoft UK Community Map​ 👉 https://aka.ms/build/uk/community
  • 18. © Copyright Microsoft Corporation. All rights reserved.