<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Tanya Janca</title>
    <description>The latest articles on Forem by Tanya Janca (@shehackspurple).</description>
    <link>https://forem.com/shehackspurple</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F145347%2F1ae60a8b-2098-4da0-87ae-202a52daa9e2.jpeg</url>
      <title>Forem: Tanya Janca</title>
      <link>https://forem.com/shehackspurple</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/shehackspurple"/>
    <language>en</language>
    <item>
      <title>My blog has moved</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Sat, 25 Dec 2021 18:36:36 +0000</pubDate>
      <link>https://forem.com/shehackspurple/my-blog-has-moved-h88</link>
      <guid>https://forem.com/shehackspurple/my-blog-has-moved-h88</guid>
      <description>&lt;p&gt;*&lt;em&gt;My blog has moved! Please check it out here: *&lt;/em&gt;&lt;br&gt;
&lt;a href="https://shehackspurple.ca/blog/"&gt;https://shehackspurple.ca/blog/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>website</category>
      <category>security</category>
    </item>
    <item>
      <title>Alice and Bob Learn: Chapter Discussions</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Sat, 20 Mar 2021 03:18:29 +0000</pubDate>
      <link>https://forem.com/shehackspurple/alice-and-bob-learn-chapter-discussions-1l30</link>
      <guid>https://forem.com/shehackspurple/alice-and-bob-learn-chapter-discussions-1l30</guid>
      <description>&lt;p&gt;At the end of each chapter of &lt;a href="https://www.amazon.com/dp/1119687357/" rel="noopener noreferrer"&gt;Alice and Bob Learn Application Security&lt;/a&gt; there are questions for the reader to ponder. As the author, I will be hold streaming sessions every 4 weeks to discuss the questions, starting March 20, 2021. If you would like invites to the streams, &lt;a href="http://aliceandboblearn.com/" rel="noopener noreferrer"&gt;please sign up here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F106kki1blx4tw5mqak4c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F106kki1blx4tw5mqak4c.png" alt="Alice and Bob Learn Application Security"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All of the streams are free, and I would love to have you join us live! If you can’t make it live, you can watch them after on &lt;a href="http://youtube.com/c/shehackspurple" rel="noopener noreferrer"&gt;my YouTube Channel&lt;/a&gt;, or download them via at podcast app by looking for the podcast “Alice and Bob Learn” (which will be launched right after the first stream).&lt;/p&gt;

&lt;p&gt;Ideally you will read the chapter before the corresponding live discussion, but if you don’t, that’s okay. You will still learn, and you are definitely will welcome to attend. :-D&lt;/p&gt;

&lt;h2&gt;
  
  
  Schedule:
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;All streams are in 2021, on Saturdays, starting at noon pacific time. They can last up to three hours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/CpfWbqLEoHo" rel="noopener noreferrer"&gt;March 20: Chapter 1; Security Fundamentals&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/lWk4UTqGATU" rel="noopener noreferrer"&gt;April 17: Chapter 2; Security Requirements&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/0ImPJHEc9XU" rel="noopener noreferrer"&gt;May 15: Chapter 3; Secure Design&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/bfzpt24sBlY" rel="noopener noreferrer"&gt;June 12: Chapter 4; Secure Code&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/u8QxUQ8MjIM" rel="noopener noreferrer"&gt;July 10: Chapter 5; Common Pitfalls&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/Jd_ysSapGLc" rel="noopener noreferrer"&gt;August 7: Chapter 6: Testing and Deployment&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/vjTklSPi79E" rel="noopener noreferrer"&gt;September 4: Chapter 7; An AppSec Program&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/kOHUlm2yYRQ" rel="noopener noreferrer"&gt;October 2: Chapter 8; Securing Modern Applications and Systems&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/GYZZwCR1E84" rel="noopener noreferrer"&gt;October 30: Chapter 9; Good Habits&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/vWBiKeKgyGA" rel="noopener noreferrer"&gt;November 27: Chapter 10; Continuous Learning&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/KsYNnJVnAXE" rel="noopener noreferrer"&gt;December 11: Chapter 11; Closing Thoughts&lt;/a&gt;&lt;/p&gt;

</description>
      <category>application</category>
      <category>security</category>
      <category>appsec</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>One Year Anniversary of We Hack Purple</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Wed, 10 Mar 2021 03:20:19 +0000</pubDate>
      <link>https://forem.com/shehackspurple/one-year-anniversary-of-we-hack-purple-4ldk</link>
      <guid>https://forem.com/shehackspurple/one-year-anniversary-of-we-hack-purple-4ldk</guid>
      <description>&lt;p&gt;One year ago, I decided to start my own company. It's called &lt;a href="http://wehackpurple.com/"&gt;We Hack Purple&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.youtube.com/watch?v=YFHMoCHBH8k"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ezNfceS4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/http://img.youtube.com/vi/YFHMoCHBH8k/0.jpg" alt="We Hack Purple 1 Year Anniversary"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When I decided to start this company, I wasn't actually 100% sure what I wanted to do. I had found myself suddenly unemployed, because my previous startup had failed. Unsure of my next steps, I did what any Internet nerd would do, I posted on Twitter that I didn't know what I wanted to do with myself and asked if anyone wanted to make suggestions. Person, after person, after person asked me to start a training company. Several people offered me jobs doing application security or developer relations work on behalf of their companies, but the most common request was "Will you come in and train our devs?". Since I love public speaking, teaching and mentoring, it seemed like it could be a good fit.&lt;/p&gt;

&lt;p&gt;At first, I started by creating a &lt;a href="http://wehackpurple.com/"&gt;small online community&lt;/a&gt;, and posting content for them to read about application security. Before I knew it I had over 100 members! After about 6 months I decided that I wanted to find a new platform for us, one that would allow everyone to talk to each other, not just me. I didn't want it to just be "The Tanya Show", I wanted it to be a community where everyone could share and shine. I also wanted a safe place for people to talk about everything to do with security, and know that no one would harass them or be, well, "Twitter" at them. Last week we just relaunched the &lt;a href="http://community.wehackpurple.com/"&gt;We Hack Purple Community&lt;/a&gt;, with even more members than before, and we now have a mobile application, chat rooms, over 200 articles of content, a content drip, and real human moderators! We also have events planned throughout 2021, and we are planning so much more for the future.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ALmjeZQR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4gh4uuvovl00trm08my2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ALmjeZQR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4gh4uuvovl00trm08my2.jpg" alt="We Hack Purple Community"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After creating the online community, in April 2020 I released my first online course, titled AppSec 101. It was a hit, we sold over 100! But as we sold them, my perfectionism kicked in; I didn't think it was 'good enough' for our students. My team and I decided to re-record the entire thing, add more quizzes, samples, stories, videos and articles, as well as a textbook and a certification when you finish all three courses. We call it Application Security Foundations, and it's available on the brand-new &lt;a href="http://academy.wehackpurple.com/"&gt;We Hack Purple Academy&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yHiZbSNJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9rxu0mghiesxh88790b9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yHiZbSNJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9rxu0mghiesxh88790b9.jpg" alt="We Hack Purple Academy"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;(We also quietly announced 2 weeks ago that we are now offering live virtual training, and I am already realizing that I probably need to hire another trainer. It's a pretty exciting place to be, when there is more demand than supply.)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Another very exciting thing that happened in the past 12 months is that my book was published, &lt;a href="http://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt;. It became a bestseller on Amazon in the first week, and We Hack Purple has sold hundreds of copies itself, to our clients and customers. The book has opened a lot of doors for me, and the company, but more importantly, it has helped a lot of people learn how to make more secure software. I could not be happier with the wonderful response from readers. I am starting free online book discussions, on March 20th, 2021. If you want the schedule, and invites to the event, all for free, &lt;a href="http://aliceandboblearn.com/"&gt;sign up here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rTyOKXCG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m9os7s6l7q7636vocs9r.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rTyOKXCG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/m9os7s6l7q7636vocs9r.jpg" alt="We Hack Purple Shop"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We Hack Purple also has a &lt;a href="http://shop.wehackpurple.com/"&gt;swag store&lt;/a&gt; now, so you can wear as 'SheHacksPurple', 'He Hacks Purple', 'I Hack Purple' or 'We Hack Purple' T-shirt, hoodie, toque, socks or even a baby onesie! Honestly, the most exciting part for me is that people have actually bought them. Also, that I finally have a cute security hoodie, that actually fits my lady curves.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ucmJCkJu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b4zwuw5elxc7npcwe95b.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ucmJCkJu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/b4zwuw5elxc7npcwe95b.jpg" alt="We Hack Purple Podcast"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the past year we also started the &lt;a href="http://wehackpurple.com/"&gt;We Hack Purple Podcast&lt;/a&gt;, in August. No one tells you before you start a podcast that the absolute best part is going to be having the chance to meet your amazing guests. It has been such a wonderful opportunity for me to be able to meet and spend time with the outstanding individuals who form our guestlist. Also, it's been really fun.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ep6upIbT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/325pgmdoyitsnfzwnyi3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ep6upIbT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/325pgmdoyitsnfzwnyi3.jpg" alt="We Hack Purple Diversity Scholarship"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another amazing thing that happened in the past 12 months is people reaching out and asking if they could buy training courses for us to give away to people from underrepresented groups. We have quietly been doing this since the very beginning, but we aren't being quiet about it anymore. People would write me and say "thanks for the course I really liked it, but you didn't charge enough, could I pay for another person to take this course?" I was really surprised at first. People are so generous, and maybe it shouldn't surprise me, but I was caught off guard. After this happening enough times we decided to create the &lt;a href="https://academy.wehackpurple.com/courses/diversity-scholarship"&gt;We Hack Purple Diversity Scholarship&lt;/a&gt;. We have already enrolled over 30 people in the application security foundations program, and we have tentative pledges for over 30 more. It has absolutely humbled me to have so many individuals and companies support a cause so close to my heart, diversity in tech. Thank you to everyone who has been a part of this effort.&lt;/p&gt;

&lt;p&gt;For year two we are planning to release courses on the topics of secure coding and DevSecOps, sponsorship and participation of several community events, more WHP content, live book discussions, and so much. Thank you for being a part of We Hack Purple!&lt;/p&gt;

</description>
      <category>startup</category>
      <category>appsec</category>
      <category>business</category>
      <category>purple</category>
    </item>
    <item>
      <title>Why I Joined the NeuraLegion Advisory Board</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Thu, 04 Mar 2021 18:00:26 +0000</pubDate>
      <link>https://forem.com/shehackspurple/why-i-joined-the-neuralegion-advisory-board-3c7h</link>
      <guid>https://forem.com/shehackspurple/why-i-joined-the-neuralegion-advisory-board-3c7h</guid>
      <description>&lt;p&gt;I joined the &lt;a href="http://neuralegion.com/"&gt;NeuraLegion&lt;/a&gt; Advisory Board because they're really fun to work with. Gosh that would make for a short blog post, wouldn't it?&lt;/p&gt;

&lt;p&gt;When I started my quickly-failed startup in 2019, Security Sidekick, &lt;a href="https://twitter.com/bararchy"&gt;Bar Hofesh&lt;/a&gt; reached out to me to see if he and &lt;a href="https://twitter.com/bashvitz"&gt;Gadi Bashvitz&lt;/a&gt; could help. I was pleasantly surprised to have several people in my industry reach out to me, and even other small companies reaching out to see how they could help me with my startup. InfoSec is full of kind and generous people, let me tell you.&lt;/p&gt;

&lt;p&gt;When I left Microsoft, I had committed to several speaking engagements before I decided to leave, including the 2020 RSA conference, and rather than be in breach of contract with several conferences and potentially ruin my reputation, I completed all of the obligations that I had made while I worked there. But there was a catch: I had to pay for all my travel myself. Bar and Gadi knew this, so they offered me a free place to stay (in San Francisco!!!!!) which I really appreciated. It didn't work out in the end, but we met up in person for the first time for some Starbucks, and it was awesome.&lt;/p&gt;

&lt;p&gt;You know that feeling when you meet someone, and you like them immediately? Bar and I talked nerdy, and Gadi tolerated us. We continued to stay in touch.&lt;/p&gt;

&lt;p&gt;Fast forward a few more months and the NeuraLegion tool &lt;a href="https://www.neuralegion.com/nexdast/"&gt;NexDast&lt;/a&gt; was fully developed, and I had started We Hack Purple. We decided we wanted to find an excuse to work together, because we got along so well, and we all feel really passionately about security and changing our industry for the better.&lt;/p&gt;

&lt;p&gt;We decided that we would plan a &lt;a href="https://go.neuralegion.com/dast-for-developers-workshop"&gt;workshop together&lt;/a&gt;; I would teach a bunch of cool DevSecOps stuff, we would use &lt;a href="https://brokencrystals.com"&gt;Broken Crystals&lt;/a&gt; (more on this in another blog post), and demo their product. We made a GitHub action together, we made a workshop together, and of course we found lots of bugs together. It was super, duper fun and a smashing success!&lt;/p&gt;

&lt;p&gt;Then Christmas and Hanukkah came, and Gadi called me up. He asked me if I wanted to join their Advisory Board, so we no longer had to make excuses to work together. What could I say? I said yes.&lt;/p&gt;

&lt;p&gt;We have so many ideas of fun and awesome things we are going to work on together, to make their product even better, and to give back to the community. In addition to being great people, we also share a commitment to shifting security left and making sure application security is liberated, automated as part of the SDLC and put in the hands of developers and not just AppSec people.&lt;/p&gt;

&lt;p&gt;I'm honoured to be on their Advisory Board, and I feel lucky to have the chance to work with such a talented and fun team.&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>advisory</category>
      <category>board</category>
      <category>development</category>
    </item>
    <item>
      <title>The training you have selected is too ‘off topic’</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Sat, 12 Dec 2020 20:12:52 +0000</pubDate>
      <link>https://forem.com/shehackspurple/the-training-you-have-selected-is-too-off-topic-11k</link>
      <guid>https://forem.com/shehackspurple/the-training-you-have-selected-is-too-off-topic-11k</guid>
      <description>&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;In this series we are discussing how to get your technical training approved at work. This is not the first article, and you may want to go back and &lt;a href="https://shehackspurple.medium.com/how-to-get-your-boss-to-approve-the-training-you-want-4c0449d4840a"&gt;read it from the start&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;In the previous article, we talked about how we need to explain to our boss not only which training we want, but we must overcome any objections, if we are going to get it approved. Let's look at the second objection in our list.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--H9597vCw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/rvcjkyfurbznxgma8wlw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--H9597vCw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/rvcjkyfurbznxgma8wlw.jpg" alt="#WOCTechChat"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objection 2:  They feel the training you have selected is too ‘off topic’ from your current job.&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Back in the day I requested approval to take a web-app hacking course, and I recall my boss saying, “You don’t need to learn that; you just need to run the scanner.” My job was web app penetration testing, and it was clear my boss had no idea what I did all day. He seemed to think that manual security testing was unnecessary, and at the time I had no idea how to explain we needed a lot more if we wanted to ensure our apps were very secure. I ended up watching a lot of videos on the internet, playing around, and wasting a ton of time. &lt;/p&gt;

&lt;p&gt;When I switched over into Application Security, it got even more difficult, as most of the courses only offered to teach me “the OWASP Top Ten” (which I already knew well), and then the main security controls (authentication, authorization, encryption, identity) and little else. I wanted to know how to do &lt;em&gt;my job&lt;/em&gt;, not theory and not basic web app hacking (I already knew that). Plus, they always seemed to go really deep into encryption, but I already knew my teams would never be writing their own encryption, so I didn’t get why they felt the need to always cover it...&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6NjAN8gC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/lc4fcd7wde1sre4j9zfu.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6NjAN8gC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/lc4fcd7wde1sre4j9zfu.jpg" alt="Image provided by #WOCTechChat"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Anyway, if you are asking your boss to take training it must fall into one of two categories if it’s going to be approved:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; It will help you do your current/new job better &lt;/li&gt;
&lt;li&gt; It will help you grow within the organization so you can get a promotion someday (also known as career development)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;Note: If you are a Rudy developer and you asked your boss to pay for you to take a basket weaving course, this blog article is not going to help you. That said, if you are a Ruby developer and you asked your boss to pay for a secure-coding-in-ruby course or an application security course, then this article can help.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Remember I said in the first article that you needed to read the syllabus and keep track of what’s on the course and how it relates to your job? Now is time to get that info so we can write your justification letter. Just like in the previous article, I am going to use the &lt;a href="https://store.wehackpurple.com/application-security-foundations-program-bundle"&gt;Application Security Foundations Program&lt;/a&gt; from &lt;a href="https://wehackpurple.com"&gt;We Hack Purple&lt;/a&gt; as the example, but you should be able to use whichever training you have choose. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Dear Boss,&lt;/p&gt;

&lt;p&gt;I want to take the &lt;a href="https://store.wehackpurple.com/application-security-foundations-program-bundle"&gt;We Hack Purple Application Security Foundations Program&lt;/a&gt; for my training this year. I know you told me that it’s too ‘off topic’ for my job, but I wanted to explain to you how it will definitely help me do my job better.&lt;/p&gt;

&lt;p&gt;Right now, our InfoSec team keeps bringing in a PenTester to test our apps right before we release them. They always find 100 things wrong, because none of my dev team knows security. We always end up with late projects and everyone freaking out, because it’s so last minute. Lots of overtime and stress. &lt;/p&gt;

&lt;p&gt;Also, the program comes with a copy of Alice and Bob Learn Application Security. I know the one copy we have is currently constantly being used by my team for reference, so having a second copy would be really great.&lt;/p&gt;

&lt;p&gt;If I took this course, I would know how we could do this better. The dev team could do some testing ourselves (carefully), and other stuff to make sure our apps are in better shape by the time the PenTester comes. The program has a secure coding guideline we could adopt, and even an API best practices guide. We currently have no idea how to secure our APIs, and we keep reading on the internet and we’re lost. This course would help me understand so much! And then I could be the ‘security champion’ on our dev team, the one everyone can turn to when they need help. I know you feel this is outside my job description, but someone has to do it. I want that someone to be me.&lt;/p&gt;

&lt;p&gt;Sincerely, &lt;br&gt;
Your-Name-Here&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Up next we will cover Objection 3: There's no time with your current workload for you to take training.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;PS We Hack Purple launched a &lt;a href="https://shop.wehackpurple.com"&gt;swag shop&lt;/a&gt;, just in time for Christmas! Code securely, in style!&lt;/p&gt;

</description>
      <category>training</category>
      <category>appsec</category>
      <category>infosec</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>How to get your boss to approve the training you want</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Sat, 05 Dec 2020 15:07:59 +0000</pubDate>
      <link>https://forem.com/shehackspurple/how-to-get-your-boss-to-approve-the-training-you-want-4a5d</link>
      <guid>https://forem.com/shehackspurple/how-to-get-your-boss-to-approve-the-training-you-want-4a5d</guid>
      <description>&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is a series.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;We’ve all been there. There’s a training you really want to take, but your boss isn’t so sure. This can be because it’s out of budget, they feel it’s too ‘off topic’ from your current job, there’s no time with your current workload, they are afraid they will lose you if you have new skills, or some other reason they won’t tell you. Let’s go through all of these reasons and figure out how YOU can get you’re training approved.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DD1ZczGy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/hi01rq0707perk57m2yn.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DD1ZczGy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/hi01rq0707perk57m2yn.jpg" alt="Photo: #WOCTechChat"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note: I run my own training company, &lt;a href="https://wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;, that specializes in Application Security, Secure Coding and DevSecOps training. While I am definitely hoping this article helps our customers, I’m also hoping it helps everyone else who needs training! For our examples we will use the &lt;a href="https://store.wehackpurple.com/application-security-foundations-program-bundle"&gt;Application Security Foundations Program&lt;/a&gt; from &lt;a href="https://wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;, and we will try to justify taking it to your boss.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The first thing you need to do is make sure you are selecting the &lt;em&gt;best&lt;/em&gt; training for your specific job or career development. Don’t take the popular one, or ‘the cool one’ that people are talking about on Twitter. Evaluate very carefully which one will help you level up in your career and your current job.&lt;/p&gt;

&lt;p&gt;Next, read about the content of the training you are taking. Make notes of what’s in there and keep the syllabus handy, as you will likely need to reference it as you write your justification. You also want to have some other links to other courses to compare it to; both to explain why the one you have selected is better and why it’s (hopefully) more cost-effective.&lt;/p&gt;

&lt;p&gt;Let’s start creating our defences for your boss’s potential objections.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objection 1: We don’t have the budget/it’s too expensive.&lt;/strong&gt;&lt;br&gt;
This is the one that I personally have received the most often in my career. I have actually had a boss laugh in my face when I suggested one single course that would have cost my combined training budget for 5 years. I explained that cyber security courses are quite costly, and all of my bosses continued to reject my requests. I ended up selecting training from several different places that was cheaper, but nowhere near as good as what I had asked for. At the time I didn’t know how to get around this hurdle.&lt;/p&gt;

&lt;p&gt;With a little more industry experience and a chance to see a lot more training, I realized that I needed to explain the value of what we were getting was greater than what we were spending. Let me explain using the &lt;a href="https://wehackpurple.com"&gt;We Hack Purple&lt;/a&gt; &lt;a href="https://store.wehackpurple.com/application-security-foundations-program-bundle"&gt;Application Security Foundations Program&lt;/a&gt; as the example (but this should work with whatever you have chosen, if you have chosen the best training for your situation).&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Dear Boss,&lt;/p&gt;

&lt;p&gt;I want to take the &lt;a href="https://store.wehackpurple.com/application-&amp;gt;security-foundations-program-bundle"&gt;Application Security Foundations &amp;gt;Program&lt;/a&gt; from &lt;a href="https://wehackpurple.com"&gt;We Hack Purple&lt;/a&gt; for my training this year. I know you feel it’s too expensive and that we might not have the budget but let me explain how I think it will save us more money than it costs.&lt;/p&gt;

&lt;p&gt;We keep hiring consultants to help us with our AppSec Program, and that is very expensive. And we haven’t been getting the results we want, they show up and write one policy or one guideline, then leave. This program will provide some starter policies, standards and guidelines, so we don’t need to pay that consultant anymore. After taking the training I will know what to do and have tools to start with so I can hit the ground running.&lt;/p&gt;

&lt;p&gt;We also keep changing our strategy, because we haven’t been getting the results we want, and the dev teams don’t seem to be ‘on board’ with what we have been doing. This program will not only help me build and plan an entire AppSec program throughout the three courses, in Level 2 of the program there’s an entire module to teach me how to support our culture change (advocacy), how to build a security champions program, AND how to make presentations that aren’t the death-by-PowerPoint that we are used to giving. They even show us how to measure the effectiveness of our program, so we know if the strategy we are using is actually &lt;em&gt;working&lt;/em&gt;, so we can know when we need to change or stay the course. Right now, we are just guessing at what to do to make sure our software is secure, but with this program, I would know.&lt;/p&gt;

&lt;p&gt;I realize that $999 USD is a lot, and we are a small company. But this is the only training I could find like this on the internet, one that will teach me how to build and launch an AppSec program. That’s what the company needs me to do. Please approve this training so I can get started.&lt;/p&gt;

&lt;p&gt;Sincerely,&lt;/p&gt;

&lt;p&gt;Your-Name-Here&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Up next we will explore Objection #2: They feel the training you have selected is too ‘off topic’ from your current job.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;PS We just launched a &lt;a href="https://shop.wehackpurple.com"&gt;swag shop&lt;/a&gt;, just in time for Christmas! Code securely, in style! &lt;/p&gt;

</description>
      <category>training</category>
      <category>appsec</category>
      <category>infosec</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>Book Club: Black Lives Matter Edition</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Sat, 11 Jul 2020 19:09:47 +0000</pubDate>
      <link>https://forem.com/shehackspurple/book-club-black-lives-matter-edition-586g</link>
      <guid>https://forem.com/shehackspurple/book-club-black-lives-matter-edition-586g</guid>
      <description>&lt;p&gt;&lt;strong&gt;Check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome to the &lt;strong&gt;Black Lives Matter Edition of Book Club&lt;/strong&gt;, where we will talk about a couple of books that Tanya read recently, and what she thinks about them. The &lt;a href="https://www.shehackspurple.dev/members/posts/18266-book-club-communication-and-metrics-edition"&gt;previous article&lt;/a&gt; in this series was about &lt;a href="https://www.shehackspurple.dev/members/posts/18266-book-club-communication-and-metrics-edition"&gt;Communication and Metrics&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;All of the books listed are available in audiobook; my preferred reading format.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--gIo88MDx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/4jfwgwjqqdhg835efi76.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--gIo88MDx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/4jfwgwjqqdhg835efi76.png" alt="Black Lives Matter" title="Black Lives Matter"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are covering this topic for several reasons, but the one that makes it relevant to this membership is that when Tanya, the founder of this company, used her social media accounts to share her support for those fighting oppression and system violence and racism in America (using the &lt;strong&gt;#BlackLivesMatter&lt;/strong&gt; hashtag), all online sales at shehackspurple.dev stopped.&lt;/p&gt;

&lt;h3&gt;
  
  
  ALL sales stopped. For TWO WEEKS.
&lt;/h3&gt;

&lt;p&gt;There are usually a handful of sales per day at SheHacksPurple.dev, but it took almost 3 weeks for our first &lt;em&gt;after-Tanya-tweeted-about-BlackLivesMatters-sale&lt;/em&gt; to happen, and over 4 weeks for sales to go back to normal. There could be several reasons for this, such as people spending their time demonstrating and protesting instead of buying AppSec training. It could be that we did less less tweeting about our products and membership during that time, to give voice to more important things. The economy could have slowed down to covid...  But... It's hard to shake the feeling that the two were related. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;As a company, we felt supporting those who suffer systemic  oppression and violence was worth losing out on a couple thousand dollars in sales.&lt;/strong&gt; &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;With this in mind, we are going to review books that cover how technology can be trained to be biased, and how algorithms and systems can have bias designed directly into them. We are also going to discuss a book that discusses how to change public policy in order to reverse and/or stop bias within governmental processes, laws and systems that harm marginalized groups.&lt;/p&gt;

&lt;h2&gt;
  
  
  Book 1: &lt;a href="https://www.audible.ca/pd/Technically-Wrong-Audiobook/B075Y3C587"&gt;Technically Wrong&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech&lt;/strong&gt;&lt;br&gt;
Written by: &lt;a href="https://www.sarawb.com/"&gt;Sara Wachter-Boettcher&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This book is an excellent introduction to the idea that data can be biased and that algorithms can reinforce racist, sexist, homophobic and other societal discriminations. As someone who already considers herself somewhat aware of these problems, has attended several lectures on how to abuse AI/ML, and has a long history in the tech industry creating technical solutions and systems, this was not news to me. That said, the author covers several different ways that bias can sneak itself into these systems and makes it extremely clear to the reader how this can happen by accident, or by negligence. There are several stories of real people who are affected by these issues, and also quite a lot of statistical information proving that the issues are widespread. I found the book extremely easy to listen to and almost ‘light’ in the way it is written, despite the fact that it is about a very serious topic. For someone who is not already well versed in this topic, this is an excellent introduction. If you are like Tanya and have already read other books on this topic, you may want to start with the second book (below) in this review. However, if you are recommending a book to someone who doesn't know anything about this problem with tech, or who you are trying to convince that there is indeed a problem, this book is perfect.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Book 2: &lt;a href="https://www.audible.ca/pd/Algorithms-of-Oppression-Audiobook/B07CX3VZYF"&gt;Algorithms of Oppression&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;How Search Engines Reinforce Racism&lt;/strong&gt;&lt;br&gt;
Written by: &lt;a href="https://safiyaunoble.com/"&gt;Safiya Umoja Noble&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This book is written a bit like a PhD or a master’s dissertation; it is highly technical, with many, many references to other people's work. The narrator speaks a tiny bit like a robot, but if you can get past that, this book is enlightening. This is not a light read; this is not only due to it being quite technical in nature, but also due to the very serious subject matter. As someone who is interested in this topic, I found this book illuminating. The author covered several instances that I had never previously seen in conference talks or articles, as well as provided numerous references, quotations, studies, and other statistical information as supporting evidence for each point she made in the book. That said, this topic is tough. I was unable to listen to the entire chapter on revenge porn, as I found it too distressing. Both authors, from the book above and this book, call for the recruitment of experts in black studies, women studies, Jewish studies, LGBT studies, etc. to large high-tech companies, in order to ensure that these types of issues are not overlooked when designing the systems that so many of us use on a daily basis. The author points out that expecting someone with only an engineering or software development background to understand the complexities of ensuring that software is not biased is going to continue to lead to our current disappointing results in the many examples she illustrates throughout the book. I feel that she proved her point, over and over and over, and made me feel that the situation is urgent (it is). She also suggested solutions that are actually achievable without that much effort (when compared to the changes the next book suggests), and that I hope tech giants implement in the near future.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If you design technology systems, or design or train machine learning algorithms, you need to read this book.  &lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Book 3: &lt;a href="https://www.audible.ca/pd/How-to-Be-an-Antiracist-Audiobook/1984832212"&gt;How to Be an Antiracist&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Written and Narrated by: &lt;a href="https://www.ibramxkendi.com/"&gt;Ibram X. Kendi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This book reminds me of &lt;a href="https://www.audible.ca/pd/Invisible-Man-Got-the-Whole-World-Watching-Audiobook/B071L8DS7S"&gt;Invisible Man, Got the Whole World Watching&lt;/a&gt;, by Mychal Denzel Smith. In both books, the author explains how he became aware of how his own biases affected others via personal stories of his life. However, in How to be an Anti-Racist, the author also explains how various policies, systems, processes, laws, and other structures of society, can be and are racist, sexist, or otherwise discriminating. The stories he shares are deeply personal, vulnerable, and telling. He breaks up his intimate narratives of self-actualization with explanations of various policies, court rulings, cultural situations from the United States, and systems that harm black lives. He also provides ideas for solutions, improvement and harm reduction which are a breath of fresh air. This book is touching, thought provoking, and it may cause you to question some of your previous decisions, ideas, and more-private thoughts. I strongly recommend this book, for anyone. &lt;/p&gt;

</description>
      <category>blacklivesmatter</category>
      <category>tech</category>
      <category>algorithms</category>
      <category>racism</category>
    </item>
    <item>
      <title>Security is Everybody's Job - Part 6 - The Second Way</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Tue, 07 Jul 2020 21:15:16 +0000</pubDate>
      <link>https://forem.com/shehackspurple/security-is-everybody-s-job-part-6-the-second-way-3gf8</link>
      <guid>https://forem.com/shehackspurple/security-is-everybody-s-job-part-6-the-second-way-3gf8</guid>
      <description>&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The previous article in this series is &lt;a href="https://www.shehackspurple.dev/members/posts/24388-security-is-everybody-s-job-part-5-the-first-way"&gt;here&lt;/a&gt;. If you are lost reading this article, &lt;a href="https://www.shehackspurple.dev/members/posts/20791-security-is-everybody-s-job-part-1-devsecops"&gt;read the whole series from the start&lt;/a&gt;. :-D  This is a long post, sit tight!&lt;/p&gt;

&lt;p&gt;The Second Way of DevOps is fast feedback. In security, when we see this we should all be thinking the same thing: Pushing Left. We want to start security at the beginning of the system development life cycle (SDLC) and ensure we are there (providing feedback) the whole way through!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PfIJGbQv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/zm9c4mqxxq6pfw41pigy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PfIJGbQv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/zm9c4mqxxq6pfw41pigy.png" alt="The Second Way of DevOps" title="The Second Way of DevOps"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Fast feedback loops means getting important information to the right people, quickly and regularly. One of the main reasons that Waterfall projects failed in the past was the lack of timely feedback; no one wants to find out twelve months after they made a mistake, then they can't fix it. &lt;/p&gt;

&lt;p&gt;The goal of security activities in a DevOps environment must be to shorten and amplify feedback loops so security flaws (design issues) and bugs (code issues) are fixed as early as possible, when it's faster, cheaper and easier to do a better job. These DevOps people are really onto something!&lt;/p&gt;

&lt;p&gt;Let's go over several ideas of how to achieve this.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Activities to create fast feedback loops.&lt;/li&gt;
&lt;li&gt;Automate as much as humanly possible. Inside or outside the pipeline, automation is key.&lt;/li&gt;
&lt;li&gt;Whenever possible integrate your tools to the Dev and Ops team's tools. For instance, so that the issues found by your IAST tool are turned into tickets in the developer's bug tracking system.&lt;/li&gt;
&lt;li&gt;When you have a Pentest done check all your other apps for things in the report, then add create unit tests to look for these things&lt;/li&gt;
&lt;li&gt;Rename insecure functions or libraries as “insecure” with a wrapper, so programmers see immediately that there is an issue.&lt;/li&gt;
&lt;li&gt;Add security sprints to your project schedule (to fix all security bugs in backlog)&lt;/li&gt;
&lt;li&gt;Asking the Dev and Ops what they are concerned about (in relation to security), so you can fix any problems the security team might be causing them &lt;/li&gt;
&lt;li&gt;Add important security tests that are quick to the pipeline. For instance, scan for secrets in the code that is being checked in. That is an important test!&lt;/li&gt;
&lt;li&gt;If an important security tests fail in the pipeline, the continuous integration server must break the build.  Just like quality tests. This is loud feedback.&lt;/li&gt;
&lt;li&gt;Create a second pipeline that doesn't release any code, but runs all the long and slow security tests, then have the security team review the results after and turn the important things into tickets for the Devs.&lt;/li&gt;
&lt;li&gt;Tune all security tools as much as possible and validate all results so that the feedback you are giving is &lt;em&gt;accurate&lt;/em&gt;. There is no point of sending lots of feedback if half of it is wrong.&lt;/li&gt;
&lt;li&gt;Work with developers to create negative unit tests (sometimes known as abuse tests). Create copies of regular unit tests, rename them with "Abuse" at the end, then add malicious payloads and ensure that your app fails gracefully and handles bad input well.&lt;/li&gt;
&lt;li&gt;Have reports from your security tools automatically send their results to a vulnerability management tool such as &lt;a href="https://www.defectdojo.org"&gt;Defect Dojo&lt;/a&gt; or &lt;a href="https://threadfix.it"&gt;Thread Fix&lt;/a&gt; to keep metrics and use them to improve all of your work. You need feedback too.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Be creative. Any way that you can get feedback faster to other teams is a huge win for your team too!&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>beginners</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
    <item>
      <title>Security is Everybody's Job - Part 5 - The First Way</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Thu, 04 Jun 2020 19:32:30 +0000</pubDate>
      <link>https://forem.com/shehackspurple/security-is-everybody-s-job-part-5-the-first-way-2fd1</link>
      <guid>https://forem.com/shehackspurple/security-is-everybody-s-job-part-5-the-first-way-2fd1</guid>
      <description>&lt;p&gt;The previous article in this series is &lt;a href="https://www.shehackspurple.dev/members/posts/23749-security-is-everybody-s-job-part-4-what-is-devsecops" rel="noopener noreferrer"&gt;here&lt;/a&gt;. If you are lost reading this article, read the whole series from the start. :-D  This is a long post, sit tight!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F4lz4uj7392i7p4b8fd1l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2F4lz4uj7392i7p4b8fd1l.png" alt="The First Way of DevOps"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first "Way" of DevOps is &lt;strong&gt;emphasizing the efficiency of the entire system&lt;/strong&gt;. Many of us tend to focus only on our part of a giant system, and get bogged down improving only our own contributions to the larger process. It's rare that we stand back, look at the entire thing, and realize that if we helped another team or if changed something small within our part, that it could improve other areas for the better. The first way of DevOps is about looking at the entire system, and making sure the entire thing is as efficient as possible.  &lt;strong&gt;#speed&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When we worked in Waterfall development environments security often acted as a gate. You had to jump through their hoops, then you were let through, and you could push your code to prod. Awesome, right? Not really. It was slow. Security activities took &lt;em&gt;FOREVER&lt;/em&gt;. And things got missed. It was rigid and unpleasant and didn't result in reliably secure software.&lt;/p&gt;

&lt;p&gt;It may seem obvious to new developers that security should not slow down the SDLC, but I assure you, this concept is very, very new. When I was a software developer I referred to the security team as "Those who say no", and I found almost all of my interactions with them left me frustrated and without helpful answers.&lt;/p&gt;

&lt;p&gt;When we (security practitioners) think about The First Way, we must figure out how to get our work done, without slowing down all the other teams. They won't wait for us, we can't set up gates, we have to learn to work the way they do. &lt;em&gt;FAST&lt;/em&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Below I will offer several suggestions for how we can work together with the dev and ops teams to ensure we get our mandate done, within the DevOps workflows and processes.
&lt;/h3&gt;

&lt;p&gt;First of all, we need to use modern tooling that is made for DevOps pipelines if we are going to put anything into the CI/CD pipeline. Never take an old tool and toss it in there; no DevOps team is going to wait 5 hours for your SAST tool to run. Tune your tools and ensure you select tools that are made for pipelines if that is how you are going to use them. Whenever possible, only run your tools on the 'delta' (the code changed in that release, not the entire code base).&lt;/p&gt;

&lt;p&gt;When selecting tools, remember that not every tool needs to be put in the pipeline. In fact, having tools that are out-of-band, but located on the 'left', can offer even more value and save time. Examples:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;package management tools that only serve packages that are not known to be insecure (pre-approved by a security research team)&lt;/li&gt;
&lt;li&gt;adding security tests to your unit tests, which are often run before the code arrives in the pipeline (for instance, write input validation tests that ensures your code properly handles input taken from the &lt;a href="https://owasp.org/www-community/xss-filter-evasion-cheatsheet" rel="noopener noreferrer"&gt;XSS Filter Evasion Cheat Sheet&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;adding security tooling to the check-in process, such as secret scans (don't even let them check it in if it looks like there's a secret in the code)&lt;/li&gt;
&lt;li&gt;scanning your code repository for known-insecure components. It's just sitting there, why not use it?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This also means that security bugs should be placed in the same bug tracker or ticketing system that the developers and ops teams are using. They shouldn't check two systems, that is not efficient.&lt;/p&gt;

&lt;p&gt;If at all possible, we should be providing and/or approving tools that assist in finding vulnerabilities in written code (both the code your team wrote, and the code from dependencies) and running code. This could be SAST + SCA + DAST, or it could be SCA + IAST (run during unit testing, QA and in prod). It could also mean manual secure code review plus a PenTest the week before going live (this is the least-efficient of the three options presented here).&lt;/p&gt;

&lt;p&gt;If it makes sense, create templates and provide secure code samples, there's no need to reinvent the wheel. Also, enable the developers and ops teams to scan their own code by providing tools for them (and training on how to use them safely and effectively).&lt;/p&gt;

&lt;h3&gt;
  
  
  Think Outside The Box
&lt;/h3&gt;

&lt;p&gt;We (security) can no longer be a bottleneck, we must work to enable them to get their jobs done securely, in anyway we can. Examine your processes to ensure they are efficient; create a second asynchronous (which does not release to prod) pipeline to automate your longer tests; write your own tools if you absolutely have to. The sky is the limit.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/" rel="noopener noreferrer"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com" rel="noopener noreferrer"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>beginners</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
    <item>
      <title>Security is Everybody's Job - Part 4 - What is DevSecOps?</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Fri, 29 May 2020 01:17:34 +0000</pubDate>
      <link>https://forem.com/shehackspurple/security-is-everybody-s-job-part-4-what-is-devsecops-lcb</link>
      <guid>https://forem.com/shehackspurple/security-is-everybody-s-job-part-4-what-is-devsecops-lcb</guid>
      <description>&lt;p&gt;The previous article in this series is &lt;a href="https://www.shehackspurple.dev/members/posts/21636-security-is-everybody-s-job-part-3-what-is-devops"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In this post we will explore &lt;strong&gt;The 3 Ways of DevOps&lt;/strong&gt;. But first, a definition.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;DevSecOps is Application Security, adjusted for a DevOps environment.&lt;/p&gt;

&lt;p&gt;-&lt;a href="https://twitter.com/secfigo"&gt;Imran A Mohammed&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;DevSecOps is the security activities that application security professionals perform, in order to ensure the systems created by DevOps practices are secure. It's the same thing we (AppSec professionals) have always done, with a new twist. Thanks Imran!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OIavx7FC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/0nz5udf0bgp1mq2ogq1c.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OIavx7FC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/0nz5udf0bgp1mq2ogq1c.jpg" alt="Photo by Marvin Meyer on Unsplash "&gt;&lt;/a&gt;&lt;br&gt;
Photo by &lt;a href="https://unsplash.com/@marvelous?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Marvin Meyer&lt;/a&gt; on &lt;a href="https://unsplash.com/s/photos/tech?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Refresher on The Three Ways:&lt;/strong&gt;&lt;br&gt;
Emphasize the efficiency of the entire system, not just your part.&lt;br&gt;
Fast feedback loops.&lt;br&gt;
Continuous learning, risk taking and experimentation (failing fast)&lt;/p&gt;

&lt;p&gt;Let’s dig in, shall we?&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Emphasize the efficiency of the entire system, not just one part.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This means that Security CANNOT slow down or stop the entire pipeline (break the build/block a release), unless it's a true emergency. This means Security learning to sprint, just like Ops and Dev are doing. It means focusing on improving ALL value streams, and sharing how securing the final product offers value to all the other steams. It means fitting security activities into the Dev and Ops processes, and making sure we are fast.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Fast feedback loops.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Fast feedback loops = "Pushing Left" (in application security)&lt;/p&gt;

&lt;p&gt;Pushing or shifting "left" means starting security earlier in the System Development Life Cycle (SDLC). We want security activities to happen sooner in order to provide feedback earlier, which means this goal is 100% inline with that we want. The goal of security activities must be to shorten and amplify feedback loops so security flaws (design/architecture issues) and bugs (code/implementation issues) are fixed as early as possible, when it's faster, cheaper and easier to do a better job.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Continuous learning, risk taking and experimentation
For most security teams this means serious culture change; my favourite thing. InfoSec really needs some culture change. In fact, all of IT does (including Dev and Ops) if we want to make security everybody's job. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Part of The Third Way: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Allocating time for the improvement of daily work&lt;/li&gt;
&lt;li&gt;Creating rituals that reward the team for taking risks: celebrate successes&lt;/li&gt;
&lt;li&gt;Introducing faults into the system to increase resilience: red team exercises&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We are going to delve deep into each of the three ways over the next several articles, exploring several ways that we can weave security through the DevOps processes to ensure we are creating more secure software, without breaking the flow.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>beginners</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
    <item>
      <title>Security is Everybody's Job - Part 3 - What IS DevOps?</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Thu, 21 May 2020 01:12:10 +0000</pubDate>
      <link>https://forem.com/shehackspurple/security-is-everybody-s-job-part-3-what-is-devops-dm0</link>
      <guid>https://forem.com/shehackspurple/security-is-everybody-s-job-part-3-what-is-devops-dm0</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fqalpgznli3msqyasbdsy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fqalpgznli3msqyasbdsy.png" alt="What IS DevOps?"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What IS DevOps?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are many definitions of DevOps, too many, some might say. &lt;a href="https://dev.to/maurocon3ras/what-the-is-devops-people-process-and-products-4m4j"&gt;Some people&lt;/a&gt; say it's "People, Processes and Products", and that sounds great, but I don't know what I'm supposed to do with that. When I did waterfall I also had people, processes and products, and that was not great. I thought DevOps was supposed to be a huge improvement?&lt;/p&gt;

&lt;p&gt;I've heard other people say that it's paying one person to do two jobs (Dev and Ops), which can't be right… Can it? I've also been told once by a CEO that their product was "made out of DevOps", as though it was a substance. I decided not to work there, but that's another story. Let's look at some better sources.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/DevOps" rel="noopener noreferrer"&gt;Wikipedia says&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;DevOps is a set of practices that combines software development and information-technology operations which aims to shorten the systems development life cycle and provide continuous delivery with high software quality.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;But what are the practices? Why are we aiming to shorten the SDLC? Are we making smaller software? 'What is continuous delivery'?&lt;/p&gt;

&lt;p&gt;I decided to read The DevOps Handbook. Then I knew what DevOps was, and I knew how to do it. And I discovered that I LOVED DevOps. &lt;/p&gt;

&lt;p&gt;According to the DevOps Handbook, DevOps had three goals.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;1) Improved deployment frequency; Shortened lead time between fixes;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Awesome! This means if a security bug is found it can be fixed extremely quickly. I like this.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;2) Lower failure rate of new releases and faster recovery time;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Meaning better availability, which is a key security concern with any application (CIA). Lower failures means thing are Available more often (the 'A' in CIA), and that's definitely in the security wheelhouse. So far, so good.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;3) Faster time to market; meaning the business gets what they want.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Sometimes we forget that the entire purpose of every security team is to enable the business to get the job done securely. And if we are doing DevSecOps, getting them products that are more secure, faster, is a win for everyone. Again, big check mark for security.&lt;/p&gt;

&lt;p&gt;Great, so now I think the DevOps people want the same things I, as a security person, want. Excellent. How do I &lt;em&gt;DO&lt;/em&gt; DevOps?&lt;/p&gt;

&lt;p&gt;That is where &lt;strong&gt;The Three Ways of DevOps&lt;/strong&gt; comes in.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Emphasize the efficiency of the entire system, not just one part.&lt;/li&gt;
&lt;li&gt;Fast feedback loops.&lt;/li&gt;
&lt;li&gt;Continuous learning, risk taking and experimentation (failing fast)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the next post we will talk more in detail about &lt;strong&gt;The 3 Ways&lt;/strong&gt; (and how security fits in perfectly).&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/" rel="noopener noreferrer"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com" rel="noopener noreferrer"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>beginners</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
    <item>
      <title>AMA: Where can we learn Threat Modelling?</title>
      <dc:creator>Tanya Janca</dc:creator>
      <pubDate>Thu, 14 May 2020 19:05:40 +0000</pubDate>
      <link>https://forem.com/shehackspurple/ama-where-can-we-learn-threat-modelling-30cg</link>
      <guid>https://forem.com/shehackspurple/ama-where-can-we-learn-threat-modelling-30cg</guid>
      <description>&lt;p&gt;In a recent ‘Ask Me Anything’ Tanya covers &lt;a href="https://community.wehackpurple.com"&gt;‘Where can we learn Threat Modelling?’&lt;/a&gt;. The linked video is approximately 2 minutes.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/UNqokgCI-KI"&gt;
&lt;/iframe&gt;
 &lt;/p&gt;

&lt;p&gt;Where can we learn Threat Modelling?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Threat modelling, for those who are unaware, is a sort of ‘evil brainstorming’.&lt;/li&gt;
&lt;li&gt;The question included “How can we learn by doing, not just reading?”
Play the game “&lt;a href="https://github.com/adamshostack/eop"&gt;Escalation of Privilege&lt;/a&gt;”, create by &lt;a href="https://adam.shostack.org"&gt;Adam Shostack&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;You can actually play online, for free! It just came online last week. &lt;a href="http://eopgame.herokuapp.com/?s=kG5aZwUukMYvfdTa&amp;amp;c=1&amp;amp;m=66f036b872d48fc2f7a85d3539829059234aee64"&gt;Play online here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;She also mentions that you should play &lt;a href="https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/"&gt;Backdoors and Breaches&lt;/a&gt;, however, that is an incident response card game. You should still play it, but it won’t teach you threat modelling. :-D&lt;/li&gt;
&lt;li&gt;Every time there is a new project at work, meet with them for one hour and just &lt;em&gt;try&lt;/em&gt; to threat model. It’s okay if it’s not perfect, if you identify just one risk you had not thought of, your sessions was productive.&lt;/li&gt;
&lt;li&gt;Every time someone else at work is doing a threat model, sit in and “job shadow” them. Learning by watching and participating is a fantastic way to get in the middle of things.&lt;/li&gt;
&lt;li&gt;Non-hands-on activities: 1) watch the many videos on this topic by several experts in the area, &lt;a href="https://adam.shostack.org"&gt;Adam Shostack&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=3Fl_7FrM_gI&amp;amp;feature=youtu.be"&gt;Avi Douglen&lt;/a&gt;, &lt;a href="https://owasp.org/www-pdf-archive/AppSecEU2012_PASTA.pdf"&gt;Tony UcedaVelez&lt;/a&gt;, &lt;a href="https://twitter.com/caromoeckel"&gt;Caroline Moeckel&lt;/a&gt;, &lt;a href="https://twitter.com/TashJNorris"&gt;Tash Norris&lt;/a&gt;, the list goes on and on.&lt;/li&gt;
&lt;li&gt;Whiteboard designs with people and then ‘put on your black hat’ and take a look.&lt;/li&gt;
&lt;li&gt;Ask the tech team (developers, architects, ops peeps), ‘If you were going to hack your app, how would you do it?” The answers may terrify you, but you’ll be happy you asked.&lt;/li&gt;
&lt;li&gt;Read &lt;a href="https://twitter.com/shehackspurple"&gt;Tanya Janca’s&lt;/a&gt; numerous articles on the topic: &lt;a href="https://medium.com/bugbountywriteup/hacking-robots-and-eating-sushi-6a56b6f6a6c9"&gt;Hacking Robots and Eating Sushi&lt;/a&gt;, &lt;a href="https://dev.to/azure/threat-modelling-serverless-500k"&gt;Threat Modelling Serverless&lt;/a&gt;, and &lt;a href="https://dev.to/azure/pushing-left-like-a-boss-part-6-threat-modelling-1j5g"&gt;Threat Modelling&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Then we get a bit off topic and start talking about Azure DevOps and GitHub Actions…&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;For this and more, check out my book, &lt;a href="https://aliceandboblearn.com/"&gt;Alice and Bob Learn Application Security&lt;/a&gt; and my online training academy, &lt;a href="https://academy.wehackpurple.com"&gt;We Hack Purple&lt;/a&gt;!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;PS The Video Quality is low in this video and has been improved in future recordings.&lt;/p&gt;

</description>
      <category>threat</category>
      <category>application</category>
      <category>security</category>
      <category>appsec</category>
    </item>
  </channel>
</rss>
