<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Fernando Cardoso (Kalopa)</title>
    <description>The latest articles on Forem by Fernando Cardoso (Kalopa) (@fernandostc).</description>
    <link>https://forem.com/fernandostc</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F834288%2Feef7e2ca-7768-499c-a496-cbc0d6d22700.jpeg</url>
      <title>Forem: Fernando Cardoso (Kalopa)</title>
      <link>https://forem.com/fernandostc</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/fernandostc"/>
    <language>en</language>
    <item>
      <title>How to use CSPM to help your organization against Ransomware attacks targeting data on Amazon S3?</title>
      <dc:creator>Fernando Cardoso (Kalopa)</dc:creator>
      <pubDate>Wed, 19 Jul 2023 12:40:18 +0000</pubDate>
      <link>https://forem.com/aws-builders/how-to-use-cspm-to-help-your-organization-against-ransomware-attacks-targeting-data-on-amazon-s3-1hkm</link>
      <guid>https://forem.com/aws-builders/how-to-use-cspm-to-help-your-organization-against-ransomware-attacks-targeting-data-on-amazon-s3-1hkm</guid>
      <description>&lt;p&gt;Article was published initially on Medium -&amp;gt;&lt;a href="https://blog.devops.dev/how-to-use-cspm-to-help-your-organization-against-ransomware-attacks-targeting-data-on-amazon-s3-79eb71c04fa8"&gt;Link&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1tQs5dh3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://cdn-images-1.medium.com/max/2000/1%2AB1euG-DxZ_uin42G_wuoNw.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1tQs5dh3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://cdn-images-1.medium.com/max/2000/1%2AB1euG-DxZ_uin42G_wuoNw.gif" alt="" width="384" height="216"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ransomware attacks are becoming more frequent and sophisticated, with crackers targeting cloud-based data storage systems like Amazon S3. To protect your organization’s sensitive information from these threats, it’s important to implement a comprehensive security strategy. One of the tools that can help you achieve this is a Cloud Security Posture Management (CSPM) solution.&lt;/p&gt;




&lt;h2&gt;
  
  
  What is CSPM?
&lt;/h2&gt;

&lt;p&gt;CSPM is a software solution that automates the process of monitoring and managing cloud security configurations. It provides a centralized view of your security posture across all your cloud assets, including Amazon S3. CSPM solutions use a combination of machine learning and human expertise to identify security risks and vulnerabilities and provide recommendations for remediation.&lt;/p&gt;

&lt;p&gt;Some of the solutions can be integrated into your ticketing system (ServiceNow, PageDuty), notification tools(Microsoft Teams, Slack), integrated into IDE and CI/CD pipelines, and many others integration that can help your team to have full visibility in realtime about cloud misconfigurations.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--s3Ey_zz4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2422/1%2AhcD5-14mJx30uepEGlyiYg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--s3Ey_zz4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2422/1%2AhcD5-14mJx30uepEGlyiYg.png" alt="" width="800" height="435"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Attacks Vectors
&lt;/h2&gt;

&lt;p&gt;Ransomware attacks on Amazon S3 are fundamentally distinct from those targeted toward conventional computer systems or servers with a traditional file system architecture. The two ways that we can consider for an Amazon S3 attack will be:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;1º&lt;/strong&gt; — Ransomware can be uploaded to buckets through an application or directly uploaded to S3. To protect your cloud infrastructure against it you will need a malware-scanning solution to scan every objective storage into the buckets. For more details on how to do it, here is a previous article that I talked about it -&amp;gt; &lt;a href="https://medium.com/geekculture/defending-in-depth-s3-buckets-66883620ea4c"&gt;Defending in Depth S3&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;2º&lt;/strong&gt; — The Amazon Simple Storage Service (S3) can only be accessed through the S3 API, and every operation performed through this API, such as (“Put,” “Get,” “Delete,” etc.), and it must be authenticated. This highlights the significance of properly managing credentials, as they play a crucial role in securing access to the S3 service and all the resources in the cloud.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is imperative to note that Amazon S3 operates on a platform that is not susceptible to compromise by malware. Unlike traditional file systems, where ransomware attacks can result in direct encryption of files (referred to as objects in S3), S3 objects cannot be altered. Instead, any modifications to S3 objects can only be achieved by copying or deleting them. This architectural design renders the execution of malware within S3 infeasible. Adversaries seeking to manipulate S3 objects or buckets must resort to using APIs and accessing them via the &lt;strong&gt;victim’s credentials.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--oO0N9np---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2000/0%2A-6vLhi27VEYIb_-P.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--oO0N9np---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2000/0%2A-6vLhi27VEYIb_-P.png" width="512" height="304"&gt;&lt;/a&gt;&lt;br&gt;Image from Amazon Web Services Blog
  &lt;/p&gt;

&lt;p&gt;Securing data stored in Amazon S3 requires careful consideration of access permissions. By default, no access is granted, and it is essential to explicitly grant access through various mechanisms, including bucket policies and Access Control Lists (ACLs). Another important factor to consider is the use of IAM, where both users and roles can be granted access to S3.&lt;/p&gt;

&lt;p&gt;It is critical to review the level of access granted to each IAM user and role, being mindful of potentially harmful actions such as DeleteObject and PutBucketLifecycleConfiguration, which could result in unintended consequences. To minimize the risk of data breaches, it is advisable to follow the principle of &lt;strong&gt;least privilege&lt;/strong&gt;, only granting the minimum level of access necessary to perform a specific task. For more details about this topic here are three additional pieces of content :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html"&gt;Access Policies&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://medium.com/aws-tip/the-who-the-what-the-where-and-how-to-limit-the-blast-radius-3c0ab6feacd"&gt;The Who, the What, the Where, and How To Limit the Blast Radius&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://maturitymodel.security.aws.dev/en/model/"&gt;AWS Security Maturity Model&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here is a good example of how this attack could happen:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1hks7Wa9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/4072/1%2AHMmLU3PGMt3mgYnWNbE7cw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1hks7Wa9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/4072/1%2AHMmLU3PGMt3mgYnWNbE7cw.png" width="800" height="444"&gt;&lt;/a&gt;&lt;br&gt;Attack Example in steps
  &lt;/p&gt;




&lt;h2&gt;
  
  
  How can CSPM help protect buckets against Ransomware targeting data on Amazon S3?
&lt;/h2&gt;

&lt;p&gt;AWS recommends the following features to protect S3 buckets against ransomware attacks. Looking for one S3 bucket is simple, but how about 100 or 1,000 buckets across multiple AWS accounts and multiple AWS regions? Here is where CSPM tool could easily help you and your organization.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--whJ4_tQe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/3676/1%2AEq1fXpZrKosJ_QDAYZ9fZQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--whJ4_tQe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/3676/1%2AEq1fXpZrKosJ_QDAYZ9fZQ.png" width="800" height="534"&gt;&lt;/a&gt;&lt;br&gt;Source: [&lt;a href="https://d1.awsstatic.com/events/aws-reinforce-2022/TDR431_The-anatomy-of-a-ransomware-event-targeting-data-residing-in-Amazon-S3.pdf"&gt;https://d1.awsstatic.com/events/aws-reinforce-2022/TDR431_The-anatomy-of-a-ransomware-event-targeting-data-residing-in-Amazon-S3.pdf&lt;/a&gt;
  &lt;/p&gt;

&lt;p&gt;Here is a good example of rules out of the box from CSPM tools that could help you to detect those misconfigurations in minutes across multiple accounts, but more than that it will help you to keep continuous monitoring. The CSPM provides real-time monitoring of your Amazon S3 environment, so you can detect and respond to potential misconfigurations very quickly.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--IxmZAFvO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/4272/1%2AAxoko9AxnlJWzJrk_AAKBg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--IxmZAFvO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/4272/1%2AAxoko9AxnlJWzJrk_AAKBg.png" width="800" height="599"&gt;&lt;/a&gt;&lt;br&gt;Source: [Trend Cloud One — Conformity
  &lt;/p&gt;

&lt;p&gt;Here are some additional features that could help to protect your S3 buckets:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Policy Enforcement: CSPM solutions can help enforce your organization’s security policies by checking for misconfigurations and alerting you to any deviations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access Control: CSPM can help you manage access control to your Amazon S3 data so that only authorized personnel can access sensitive information. This is important in the event of a ransomware attack, as it limits the scope of the attack.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Encryption: CSPM can also help you encrypt sensitive data stored on Amazon S3, making it more difficult for crackers to access and steal sensitive information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Backup and Recovery: CSPM solutions can help you implement an effective backup and recovery strategy, so you can quickly restore your data in the event of a ransomware attack.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;In conclusion, CSPM is a valuable tool in helping organizations protect their data stored on Amazon S3 from ransomware attacks. By providing continuous monitoring, policy enforcement, access control, encryption, backup, and recovery capabilities provided by AWS. It can help you secure your sensitive information and reduce the risk of data loss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Additional Resources:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://d1.awsstatic.com/events/aws-reinforce-2022/TDR431_The-anatomy-of-a-ransomware-event-targeting-data-residing-in-Amazon-S3.pdf"&gt;The anatomy of ransomware event targeting data residing in Amazon S3 (Session from Re:Inforce 2022)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://trendmicro.awsworkshop.io/"&gt;Securing AWS Infrastructure with CSPM (Workshop)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://maturitymodel.security.aws.dev/en/model/"&gt;AWS Security Maturity Model&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>ransomware</category>
      <category>cybersecurity</category>
      <category>cloud</category>
    </item>
    <item>
      <title>How can we integrate security into the DevOps pipelines?</title>
      <dc:creator>Fernando Cardoso (Kalopa)</dc:creator>
      <pubDate>Thu, 22 Jun 2023 16:57:24 +0000</pubDate>
      <link>https://forem.com/aws-builders/how-can-we-integrate-security-into-the-devops-pipelines-503e</link>
      <guid>https://forem.com/aws-builders/how-can-we-integrate-security-into-the-devops-pipelines-503e</guid>
      <description>&lt;p&gt;Article was published initially on Medium -&amp;gt;&lt;a href="https://medium.com/swlh/how-to-integrate-security-on-the-devops-pipeline-e36dea836d7b"&gt;Link&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Without a doubt, this may be one of the most common questions from security teams nowadays. The reason behind it is, security teams are only being involved by DevOps teams when business clients reach out about compliance, security, and internal as well as external regulations. By the time this stage of the project is reached, the CI/CD pipeline is already built-in, and it may be too complex for security teams to understand all the stages in the pipeline process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--htrdc9GH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2000/1%2AHEcURMPkaq-LVfdqGvqGvA.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--htrdc9GH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2000/1%2AHEcURMPkaq-LVfdqGvqGvA.jpeg" width="770" height="330"&gt;&lt;/a&gt;&lt;br&gt;Image source from &lt;a href="https://devops.com"&gt;https://devops.com&lt;/a&gt;
  &lt;/p&gt;

&lt;p&gt;Traditionally, DevOps teams have a singular focus on building applications and delivering on release dates with little consideration to which security layers should be added to the pipeline. This is mainly because of three key challenges:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1º —&lt;/strong&gt; The lack of knowledge security teams possess of DevOps.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2º —&lt;/strong&gt; The high demand business units face to deliver new features, applications, and fixes, forcing DevOps teams to skip the stage of integrating security into the pipeline.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3º —&lt;/strong&gt; The inadequate selection of security solutions to be seamlessly integrated into the pipeline.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;The “Big” Issue with this Integration and How to Overcome it&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4jDXNE6K--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/3216/1%2AUgdRcaKitV2lj_D2U4Ty7g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4jDXNE6K--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/3216/1%2AUgdRcaKitV2lj_D2U4Ty7g.png" width="800" height="329"&gt;&lt;/a&gt;&lt;br&gt;Image source: [&lt;a href="https://blog.hyperiondev.com"&gt;https://blog.hyperiondev.com&lt;/a&gt;
  &lt;/p&gt;

&lt;p&gt;The majority of the security teams today have limited knowledge in programming languages such as, Ruby, Go, Node.JS, Java, Python, and others alike. In the past, when DevOps was much less prevalent, the security team didn’t have the responsibility to verify security processes in the development pipeline. The code security was and largely still is dependent on the background knowledge of developers and best practices they rely on for their development process. In most situations, developers have autonomy over their process and how they do their job if they produce the results the business is expecting. Recent culture changes like DevSecOps have introduced a new set of tools to automate security and incident response in the process. It won’t be long until the market and the security teams start adapting and accepting this new reality.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NewlgOft--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2748/1%2AXiy1V77Hml-_ED2obDSemQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NewlgOft--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/2748/1%2AXiy1V77Hml-_ED2obDSemQ.png" alt="" width="800" height="737"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Companies should consider investing in their people by creating cross-functional teams that focus on training developers on the security discipline and teaching security professionals about the development process to fully embrace a DevSecOps culture. This could help security teams have a better understanding of programming languages and how to use APIs to automate the simple processes and win time for a more critical task inside your companies. It may sound cliché, but think about how many people in your team are confident enough to create an automation script in python or any language or manipulate APIs to automate the regular day-to-day work. I bet it is hard, but let me assure you understand this is quickly changing and becoming a sought after skill. Every single company is becoming a software company. If your company is not well adapted to the new world, you may start to face some very complicated challenges shortly.&lt;/p&gt;

&lt;p&gt;An excellent example of this new world is how big companies are now asking and checking your GitHub or GitLab to see projects that you have been working on. Which open source project have you been helping in the last couple of years?&lt;/p&gt;

&lt;p&gt;The OpenSource community is growing a lot, see some extra details about it in one of the latest reports about it from DigitalOcean: &lt;a href="https://www.digitalocean.com/blog/digitalocean-currents-december-2019"&gt;Link&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;h1&gt;
  
  
  “Try learning some programming language fast, it will help you more than you think in the future.”
&lt;/h1&gt;
&lt;/blockquote&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;8 Recommendations To Start Implementing Security In Your CI/CD Pipeline&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The examples below are the most common security layers companies across the globe add in the DevOps pipeline:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ngYKtlHx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/5984/1%2A9c6T1w_QXjOb8F-d20koaA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ngYKtlHx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/5984/1%2A9c6T1w_QXjOb8F-d20koaA.png" alt="" width="800" height="464"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let’s dig in deep to all of the possible security components mentioned in the diagram above:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unit Testing&lt;/strong&gt; is a level of software testing where individual and small units or components of a software are verified. It could be used by developers to make sure precisely the right function is providing the right return, and a change/update in a small function is not affecting the results from the application.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Static Application Security Testing or (SAST)&lt;/strong&gt; , also known as a “white box testing,” has been around for more than a decade. It allows developers to find vulnerabilities in the application source code earlier in the software development life cycle (SDLC). SAST solutions analyze an application from the “inside out” in a nonrunning state. Finding vulnerabilities in this stage of the SDLC can help your company save money and remediate the code faster.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dynamic Application Security Testing or (DAST)&lt;/strong&gt; , also known as “black box” testing, can find security vulnerabilities and weaknesses in typically web apps without a view into the internal source code. It does that by employing fault injection techniques on an application, such as feeding malicious data to the software to identify common security vulnerabilities, such as SQL injection and Cross­site scripting (XSS). It uses the same techniques that an attacker uses to find potential weaknesses in the application.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dependency Scanning&lt;/strong&gt; is an automated vulnerability scan in the dependencies while you are developing and testing applications, which looks for security issues. Many applications nowadays use external libraries or packages from open source projects that could have libraries with known vulnerabilities, and most of the time, the developers forget to check those things.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Container Scanning&lt;/strong&gt; is a container image analyzer for known vulnerabilities, secrets keys (private keys), compliance checklist, and malware. Executing container security scanning at all stages of the software development life cycle (SDLC) helps the operations team to gain a clear understanding of what the security concerns are inside the container before they are sent to the production environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Runtime Protection&lt;/strong&gt; is a security layer used on physical or virtual machines to protect the operating system and/or container engines. Some people forget it is crucial to protect the OS on the container host, because if it is compromised it could generate a DoS (Denial-of-Service) from all the containers running on that container host or node. This solution can help you to protect against malware, vulnerabilities and also assist with the audit process using features like file integrity monitoring, log inspection, and application control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privileged Container Security&lt;/strong&gt; is a container where the container uid 0 is mapped to the host’s uid 0. In such containers, protection of the host, and prevention of escape is entirely done through Mandatory Access Control (apparmor, selinux), seccomp filters, dropping of capabilities, and namespaces. Those technologies combined typically prevent any accidental damage of the host, where damage is defined as things like reconfiguring host hardware, reconfiguring the host kernel, or accessing the host filesystem. There are some concerns with this security capability as a way to protect the environment if you are giving the privileged container full access to the host. This could potentially impact all the containers running on it if something goes wrong.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Runtime Application Self-Protection or (RASP)&lt;/strong&gt; works inside the application as a security framework that monitors and continuously inspects traffic to the application and dynamically intercepts any traffic that indicates malicious behavior. RASP solutions can protect against SQL injection, Cross-site scripting (XSS), vulnerabilities, bots, and many other web application attacks. A RASP security framework is attached at the start of the SDLC, making the application secure by default. This security concept can be used in web applications, containers, and serverless.&lt;/p&gt;

&lt;p&gt;Those are some of the most common security layers that you can add to the DevOps pipeline nowadays. I know it may seem complicated to add all of those layers at the same time, but with a good plan, you can adapt and make significant security progress in your current CI/CD pipelines.&lt;/p&gt;




&lt;h2&gt;
  
  
  Additional Architecture
&lt;/h2&gt;

&lt;p&gt;Following below is an architecture with more details and the breakdown of how to layer in security at different steps in a DevOps pipeline:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Y3iNLQXa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/5948/1%2A9y_HWzlTmc9ck8o5T2_fdg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Y3iNLQXa--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://cdn-images-1.medium.com/max/5948/1%2A9y_HWzlTmc9ck8o5T2_fdg.png" alt="" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Every company across the globe is becoming a software company and in order to stay successful, competitive, and secure, they will need to re-think the current cybersecurity strategy for cloud workloads, containers, and serverless environments.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;In summary, more involvement from the security team in the early stages of the project is beneficial. This facilitates more reliable communication and integration between the DevOps and security teams, to achieve higher quality outcomes and better security of the applications delivered for your customers/business.&lt;/p&gt;

&lt;p&gt;Thank you for reading this article. I hope it helps you better understand how to build a more secure DevOps pipeline.&lt;/p&gt;




&lt;h3&gt;
  
  
  Acknowledgment
&lt;/h3&gt;

&lt;p&gt;I would like to say a BIG thank you for some people that helped me with amazing feedback to improve this article:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Stephanie Laranjeira&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Russ Cahoon&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Erik Scoralick&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ingrid Kibler&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;References:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;● &lt;a href="https://www.softwaresecured.com/what-do-sast-dast-iast-and-rasp-mean-to-developers/"&gt;https://www.softwaresecured.com/what-do-sast-dast-iast-and-rasp-mean-to-developers/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;● [&lt;a href="https://www.gartner.com/it-glossary/static-application-security-testing-sast/#targetText=Static%20application%20security%20testing%20(SAST,out%E2%80%9D%20in%20a%20nonrunning%20state.%5D(https://www.gartner.com/it-glossary/static-application-security-testing-sast/#targetText=Static%20application%20security%20testing%20(SAST,out%E2%80%9D%20in%20a%20nonrunning%20state"&gt;https://www.gartner.com/it-glossary/static-application-security-testing-sast/#targetText=Static%20application%20security%20testing%20(SAST,out%E2%80%9D%20in%20a%20nonrunning%20state.](https://www.gartner.com/it-glossary/static-application-security-testing-sast/#targetText=Static%20application%20security%20testing%20(SAST,out%E2%80%9D%20in%20a%20nonrunning%20state&lt;/a&gt;.)&lt;/p&gt;

&lt;p&gt;● &lt;a href="https://linuxcontainers.org/lxc/security/"&gt;https://linuxcontainers.org/lxc/security/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;● &lt;a href="https://kubernetes.io/docs/tasks/configure-pod-container/security-context/"&gt;https://kubernetes.io/docs/tasks/configure-pod-container/security-context/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;● &lt;a href="https://dzone.com/articles/the-significance-amp-challenges-of-integrating-sec"&gt;https://dzone.com/articles/the-significance-amp-challenges-of-integrating-sec&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;● &lt;a href="https://searchsecurity.techtarget.com/tip/DevOps-security-checklist-requires-proper-integration"&gt;https://searchsecurity.techtarget.com/tip/DevOps-security-checklist-requires-proper-integration&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Other articles recommended:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Unit Testing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;● &lt;strong&gt;Unit testing, you’re doing it wrong&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;o &lt;a href="https://medium.com/@Cyrdup/unit-testing-youre-doing-it-wrong-407a07692989"&gt;https://medium.com/@Cyrdup/unit-testing-youre-doing-it-wrong-407a07692989&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;● &lt;strong&gt;How to take the most out of your Unit Tests&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;o &lt;a href="https://medium.com/feedzaitech/how-to-take-the-most-out-of-your-unit-tests-c80c88aa26cf"&gt;https://medium.com/feedzaitech/how-to-take-the-most-out-of-your-unit-tests-c80c88aa26cf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If this post was helpful, please click the clap 👏 button below a few times 😉👍! ⬇&lt;/p&gt;

</description>
      <category>devops</category>
      <category>devsecops</category>
      <category>security</category>
      <category>automation</category>
    </item>
  </channel>
</rss>
