01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

APIs are everywhere and new architecture patterns like microservices are here to stay. But application<br />

security problems still persist because all these services run on http, making them susceptible to existing<br />

http vulnerabilities. In DevOps and computing, there are four application security defense needs that<br />

organizations cannot do without:<br />

1. ChatOps<br />

With the rise of Internet Relay Chat (IRC) replacement systems like Slack or Teams, there has been an<br />

outcropping in the DevOps movement known as ChatOps. This encourages alerting, system actions and<br />

events to live where the development team already is: in chat, rather than in logs.<br />

Application security programs should distribute events back to the developer teams. When under attack,<br />

messages should appear in Slack showing that defensive measures were taken, like this:<br />

The goal is to bring the team together and keep security data in front of the people who create and deliver<br />

the application or service without getting in the way.<br />

ChatOps even offers simple command driven feedback, a developer or security practitioner can quickly use<br />

a ChatOps bot to query a specific metric and it will retrieve the appropriate data.<br />

2. Data Visualization and Dashboards<br />

Web Application Firewalls (WAFs) have largely gone un-visualized for their entire existence -- developers<br />

who actually wrote the applications don’t have access to their security data. Some of the legacy WAF<br />

vendors provide high level metrics; however, most of their offerings resemble log management software and<br />

pre-paid analyst services.<br />

Visualization is an absolute must-have. In the modern era of DevOps, sharing is key. Two basic questions<br />

that Zane Lackey, CSO at Signal Sciences often asks are:<br />

76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!