This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec Pipeline"
From OWASP
(→Sample Tooling by Phase) |
m (Tag: Visual edit) |
||
(20 intermediate revisions by 3 users not shown) | |||
Line 5: | Line 5: | ||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
− | | valign="top" | + | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | |
==The OWASP AppSec Rugged DevOps Pipeline Project== | ==The OWASP AppSec Rugged DevOps Pipeline Project== | ||
− | The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program. Using the documentation and references of this project will allow you to setup your own AppSec Pipeline. | + | The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program. Using the sample implementation, documentation and references of this project will allow you to setup your own AppSec Pipeline. |
==Description== | ==Description== | ||
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline. AppSec Pipelines takes the | The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline. AppSec Pipelines takes the | ||
− | + | principles of DevOps and Lean and applies that to an application security program. The project will gather references, code, and specific guidance for tools/software which would compose an AppSec Pipeline. | |
==Licensing== | ==Licensing== | ||
Line 21: | Line 21: | ||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
− | | valign="top" | + | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | |
− | == What is OWASP | + | == What is the OWASP AppSec Pipeline Project? == |
− | The AppSec | + | The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline. |
== Project Leaders == | == Project Leaders == | ||
[mailto:matt.tesauro@owasp.org Matt Tesauro]<br /> | [mailto:matt.tesauro@owasp.org Matt Tesauro]<br /> | ||
− | [mailto:aaron.weaver2@gmail.com Aaron Weaver]<br/> | + | [mailto:aaron.weaver2@gmail.com Aaron Weaver]<br /> |
− | + | ||
+ | == Contributors == | ||
+ | |||
+ | <br /> | ||
== Related Projects == | == Related Projects == | ||
Line 37: | Line 40: | ||
[[OWASP_Web_Testing_Environment_Project]] | [[OWASP_Web_Testing_Environment_Project]] | ||
− | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | + | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->| valign="top" style="padding-left:25px;width:200px;" | |
− | | valign="top" | ||
− | |||
− | |||
− | |||
− | |||
== News and Events == | == News and Events == | ||
− | + | [https://raw.githubusercontent.com/appsecpipeline/AppSecPipeline-Specification/master/reference/diagrams/pipeline-static.png AppSecPipeline Specification Diagram] | |
− | |||
== In Print == | == In Print == | ||
Line 54: | Line 51: | ||
==Classifications== | ==Classifications== | ||
− | |||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
|- | |- | ||
− | | align="center" valign="top" width="50% | + | | rowspan="2" align="center" valign="top" width="50%" | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] |
− | | align="center" valign="top" width="50%"| [[File:Owasp-breakers-small.png|link=]] | + | | align="center" valign="top" width="50%" | [[File:Owasp-breakers-small.png|link=]] |
|- | |- | ||
− | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]] | + | | align="center" valign="top" width="50%" | [[File:Owasp-defenders-small.png|link=]] |
|- | |- | ||
− | | colspan="2" align="center" | + | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] |
|- | |- | ||
− | | colspan="2" align="center" | + | | colspan="2" align="center" | [[File:Project_Type_Files_DOC.jpg|link=]]<br /> <br />[[File:Project_Type_Files_CODE.jpg|link=]]<br /> <br />[[File:Project_Type_Files_TOOL.jpg|link=]] |
|} | |} | ||
|} | |} | ||
− | |||
=Pipeline Tools= | =Pipeline Tools= | ||
Line 103: | Line 98: | ||
==What is an AppSec Pipeline?== | ==What is an AppSec Pipeline?== | ||
− | An AppSec Pipelines takes the | + | An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. |
Pipelines have four distinct areas which will be covered in depth. The first is the "Intake process" or "first impression." This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application. The second part is "triage" where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is "test" which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is "deliver" where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management. | Pipelines have four distinct areas which will be covered in depth. The first is the "Intake process" or "first impression." This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application. The second part is "triage" where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is "test" which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is "deliver" where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management. | ||
Line 136: | Line 131: | ||
'''Recommended Tools''' | '''Recommended Tools''' | ||
A complete listing of tools and review will be in the Pipeline Tools section. | A complete listing of tools and review will be in the Pipeline Tools section. | ||
− | * | + | * : An application security utility to assist in the organization and prioritization of software security activities and defect tracking application. |
− | **Dashboard showing entire application portfolio and last | + | **Dashboard showing entire application portfolio and last engagement dates |
− | **Applications requiring | + | **Applications requiring engagements |
− | ** | + | **Importers for many scanners |
− | + | **Integration with Jira | |
− | ** | + | **API for integration with security tools |
− | ** | ||
===Pipeline - Triage === | ===Pipeline - Triage === | ||
Line 181: | Line 175: | ||
'''AppSec Pipeline Presentations''' | '''AppSec Pipeline Presentations''' | ||
− | *[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 | + | *[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 |
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 | *[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 | ||
Line 194: | Line 188: | ||
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015 | * [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015 | ||
− | = | + | =Milestones= |
− | === | + | ===Dockers Released === |
+ | *Released [https://hub.docker.com/u/appsecpipeline/ AppSec Docker] | ||
+ | |||
+ | ===Docker AppSec Pipeline Specification Released=== | ||
+ | *Beta Release: View the [https://github.com/appsecpipeline/AppSecPipeline-Specification Github repo] and specification | ||
=FAQs= | =FAQs= | ||
Line 213: | Line 211: | ||
Besides the project leaders, contributions have been made by: | Besides the project leaders, contributions have been made by: | ||
− | * | + | * |
− | + | ||
− | + | = Getting Involved = | |
+ | |||
+ | Involvement in the DevOps AppSec Pipeline is actively encouraged! | ||
+ | |||
+ | You do not have to be a security expert in order to contribute. | ||
+ | |||
+ | Some of the ways you can help: | ||
+ | |||
+ | ==Case Studies== | ||
+ | |||
+ | Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. | ||
− | = | + | ==Tools== |
+ | Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. | ||
− | + | ==Feedback== | |
− | |||
− | |||
− | |||
+ | Please use our mailing list for feedback: | ||
+ | * What do like? | ||
+ | * What don't you like? | ||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
__NOTOC__ <headertabs /> | __NOTOC__ <headertabs /> | ||
− | [[Category:OWASP Project]] | + | [[Category:OWASP Project]] |
+ | [[Category:OWASP_Builders]] | ||
+ | [[Category:OWASP_Defenders]] | ||
+ | [[Category:OWASP_Document]] | ||
+ | [[Category:Projects|AppSec Pipeline]] | ||
+ | [[Category:Incubator Projects|AppSec Pipeline]] | ||
+ | [[Category:OWASP AppSec Pipeline|AppSec Pipeline]] |