<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Nuk</title>
    <description>The latest articles on DEV Community by Nuk (@guardrailsio).</description>
    <link>https://dev.to/guardrailsio</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F122202%2F2ae0f1cb-cf64-47f9-aa77-750ab8bf9a7d.png</url>
      <title>DEV Community: Nuk</title>
      <link>https://dev.to/guardrailsio</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/guardrailsio"/>
    <language>en</language>
    <item>
      <title>The Ten Commandments of Egoless Programming</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Sat, 24 Jun 2023 03:04:43 +0000</pubDate>
      <link>https://dev.to/guardrails/the-ten-commandments-of-egoless-programming-4kb6</link>
      <guid>https://dev.to/guardrails/the-ten-commandments-of-egoless-programming-4kb6</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kyxuT0u8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dtdrg0hxrnryr1cylfaz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kyxuT0u8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/dtdrg0hxrnryr1cylfaz.png" alt="egoless programming" width="800" height="469"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At GuardRails, we prefer skilled team players of “rockstar egomaniacs” and aim to develop an excellent engineering culture centered around achieving outcomes together as a team. To achieve this, here are our Ten Commandments of egoless programming:  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Understand and accept that you will make mistakes. That’s a fact of human nature. For us, the key is to find them early and before they make it into production. However, and fortunately, mistakes are rarely fatal (unless you’re trying to steal my choccy biscuits!), so we can, and should, learn, laugh, and move on.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You are not your code. Remember, we will find problems during reviews (that’s kinda the whole point, right?) We all make mistakes, so there’s little point in taking them personally.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There will always be someone bigger, badder, and better than you, i.e., someone else will always know more. Take the opportunity to learn from them. Ask them to teach you the moves, the tips, and the tricks. “Every day’s a school day, yes?” Ask politely, smile, and don’t forget the biscuits and cake (where applicable; we’re a 100% remote company so…). Also, don’t forget to pay it forward by seeking and accepting input from others. Even when you think it’s unnecessary, we’ve all been in that situation and have something to learn.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don’t rewrite code without consultation. There’s a fine line between “fixing code” and “rewriting code.” Know the difference, and pursue stylistic changes within the framework of a code review, not as a lone enforcer.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Treat people who know less than you with respect, deference, and patience. Be kind. We can’t know everything, and due to past experiences, non-technical people tend to hold a negative stereotypical view of developers. It’s important not to reinforce this stereotype, so be helpful, friendly, and above all, patient.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Change is what makes the world go round. It’s inevitable, so be open and accept it with a smile. Without change, we can’t grow; so, regardless of requirements, platform, or tool, maybe look at each one as a new challenge rather than as an inconvenience.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The only true authority stems from knowledge, not from position. Because knowledge begets authority, and authority begets respect, the best way to obtain respect in an egoless environment is to cultivate knowledge and help others.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Fight for what you believe, but gracefully accept defeat. Understand that sometimes your ideas will be overruled. Even if you are right, take it in good grace, let it go, and crack on with the next task. Remember the old African proverb, “If you want to go fast, go alone. If you want to go far, go together.”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Don’t be “the coder in the corner.” As a 100% remote company, it’s even more important that we work together as a team. So don’t be the person in the dark office emerging only for soda: out of sight, out of touch, and out of control. Your voice is needed and will always be listened to and respected. Get involved in conversations and be an active participant in your office community.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Critique code instead of people – be kind to the coder, not to the code. We’re all part of the same teams, so it’s important to be objective, not subjective. To that end, make sure all your comments are positive and oriented to improving the code, e.g., local standards, program specs, increased performance, etc.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Working remotely is great, but we’re not kidding anyone if we say it doesn’t come with its own unique challenges. What’s important is to stay positive, keep smiling, and be patient. Remember, the three most important things in life are coffee, pizza, and a sense of humor.&lt;/p&gt;

</description>
      <category>devs</category>
      <category>programming</category>
      <category>10commandments</category>
    </item>
    <item>
      <title>What Business Owners Can Learn from Prudential Malaysia Breach (MOVEit)</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Sat, 24 Jun 2023 02:58:21 +0000</pubDate>
      <link>https://dev.to/guardrails/what-business-owners-can-learn-from-prudential-malaysia-breach-moveit-5a6i</link>
      <guid>https://dev.to/guardrails/what-business-owners-can-learn-from-prudential-malaysia-breach-moveit-5a6i</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jCFjpHhK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zflbcbpz0c8a2b0in8tk.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jCFjpHhK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zflbcbpz0c8a2b0in8tk.jpg" alt="Databreach" width="800" height="469"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What happened?
&lt;/h2&gt;

&lt;p&gt;Prudential Malaysia confirmed that two of its local subsidiaries, Prudential Assurance Malaysia Bhd (PAMB) and Prudential BSN Takaful Bhd (PruBSN), have been affected by a Cybersecurity attack caused by the MOVEit zero-day vulnerability exploit. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is “MOVEit”?
&lt;/h2&gt;

&lt;p&gt;MOVEit Transfer is a secure Managed File Transfer (MFT) software that allows the exchange of files and data between servers, systems, applications, and users within and between organizations. &lt;/p&gt;

&lt;p&gt;A zero-day vulnerability affecting MOVEit Transfer (a critical SQL injection vulnerability) has been exploited to hack organizations and steal their data.&lt;/p&gt;

&lt;h2&gt;
  
  
  How many people were affected?
&lt;/h2&gt;

&lt;p&gt;It is very likely personal agent and customer data is affected which may include name, contact number, national identification number, bank account, and/or partial credit card information.  The risk of unauthorized transactions is reduced as only partial credit card information is included.  &lt;/p&gt;

&lt;h2&gt;
  
  
  What did they do right?
&lt;/h2&gt;

&lt;p&gt;To its credit, Prudential Malaysia responded swiftly.&lt;/p&gt;

&lt;p&gt;Prudential said it immediately took action to isolate the affected server as soon as it became aware of the data breach. The company assured that its businesses remain fully operational, while its customer operations are unaffected by the attack.&lt;/p&gt;

&lt;p&gt;According to Prudential Malaysia, immediate steps are being taken to notify impacted customers and provide appropriate support, including a dedicated hotline with extended hours. Aside from that, Prudential Malaysia is committed to constantly reviewing and updating its defense systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  What lessons can we learn and apply?
&lt;/h2&gt;

&lt;p&gt;Even with DevSecOps practices in place, supply chain vulnerabilities can still pose a significant threat to organizations. The software supply chain involves various stakeholders, including third-party vendors who provide components, libraries, and other software modules. Attackers can exploit any vulnerability in these components to gain access to an organization’s system, steal sensitive data, or disrupt services. &lt;/p&gt;

&lt;p&gt;Therefore, it is crucial to have a comprehensive supply chain security program that includes risk assessments, vendor management, and continuous monitoring of the supply chain. In the context of Prudential, perhaps the organization should have been more aware of any vulnerabilities in its third-party applications and gird themselves.&lt;/p&gt;

&lt;p&gt;As companies become increasingly reliant on technology, they also become more vulnerable to cyber attacks. Cybersecurity threats can damage a company’s reputation, disrupt its operations, and cause financial losses. Therefore, it is essential for businesses to identify potential cybersecurity risks, develop a robust cybersecurity strategy, and implement security measures that can protect their assets and data.&lt;/p&gt;

</description>
      <category>databreach</category>
      <category>prudential</category>
      <category>malaysiabreach</category>
    </item>
    <item>
      <title>DAST in 5 Minutes (Or Less): What You Need to Know</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Sat, 24 Jun 2023 02:51:35 +0000</pubDate>
      <link>https://dev.to/guardrails/dast-in-5-minutes-or-less-what-you-need-to-know-4dib</link>
      <guid>https://dev.to/guardrails/dast-in-5-minutes-or-less-what-you-need-to-know-4dib</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GVomw-Bl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yaxocx6tsc457z6c2r44.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GVomw-Bl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yaxocx6tsc457z6c2r44.jpg" alt="What is DAST" width="800" height="469"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As the influence of web applications continues to grow, securing them becomes a critical business imperative. The widespread use of web applications makes web application security (AppSec) a complicated and ongoing issue, particularly in the current landscape.&lt;/p&gt;

&lt;p&gt;Incorporating a systematic procedure like security testing can help detect security vulnerabilities and weaknesses in any running application and reduce the possibility of cyber attacks.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is DAST?
&lt;/h2&gt;

&lt;p&gt;Dynamic Application Security Testing (DAST) is widely used by security and development teams to identify vulnerabilities in web applications. DAST testing involves simulating attacks on a running web application to identify security risks such as authentication failures, injection flaws, cross-site scripting (XSS), and other vulnerabilities that can be exploited by attackers.&lt;/p&gt;

&lt;p&gt;DAST allows you to find and fix security vulnerabilities before they become security issues. Plus, it can help you meet compliance regulations and ensure your customers’ data is secure.&lt;/p&gt;

&lt;p&gt;For a more detailed overview of DAST, we have a more detailed blog post.&lt;/p&gt;

&lt;h2&gt;
  
  
  How does DAST work?
&lt;/h2&gt;

&lt;p&gt;Before scanning a web app, DAST scanners crawl through it to locate and test every available input on app pages. DAST scanners are capable of detecting vulnerabilities that are not visible in the source code, such as configuration issues and authentication vulnerabilities.&lt;/p&gt;

&lt;p&gt;DAST is most effective when used as part of a comprehensive web application security testing strategy. It gels well with security testing solutions like application penetration testing and static application security testing (SAST).&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the benefits of DAST?
&lt;/h2&gt;

&lt;p&gt;DAST solutions are technology-independent, making them compatible with any programming language or framework. This flexibility allows organizations to implement DAST into their existing development and testing workflows without the need for significant changes. Additionally, DAST can help organizations ensure compliance with industry standards and regulations such as PCI DSS compliance.&lt;/p&gt;

&lt;p&gt;To test the efficacy of encryption, DAST can attempt to break through it. This method can help identify potential weaknesses in the encryption and their possible impact on business operations in the event of a breach.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are some limitations of DAST?
&lt;/h2&gt;

&lt;p&gt;One of the primary challenges with DAST is its inability to keep pace with the continuous delivery pipeline of the software development lifecycle . As the development approach has shifted away from the traditional waterfall model, DAST tools may struggle to keep up with the speed and frequency of releases.&lt;/p&gt;

&lt;p&gt;Another challenge with DAST is the potential for generating false positives, which can lead to developers spending additional time validating flagged risks. Moreover, DAST tools are not always capable of identifying latent vulnerabilities, such as design flaws or problematic coding patterns. While DAST tools examine requests and responses, they cannot detect non-compliant application code or source code.&lt;/p&gt;

&lt;h2&gt;
  
  
  What are the differences between DAST and SAST?
&lt;/h2&gt;

&lt;p&gt;Although DAST is an essential tool for identifying security vulnerabilities, it should not be used in isolation. Typically, it is used in conjunction with other testing tools such as Static Application Security Testing (SAST). Here are the areas where both application security testing methods complement each other:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7cuJIz0C--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/82iq0n1yfibx624ftz0k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7cuJIz0C--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/82iq0n1yfibx624ftz0k.png" alt="DAST vs SAST" width="800" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While SAST focuses on the code, DAST focuses on the application’s behavior and response to external stimuli. As such, a combination of SAST and DAST can provide greater coverage of vulnerabilities and a more comprehensive view of the security posture of an application.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;If you want your business to stay ahead of the game, you cannot ignore the importance of DAST.&lt;/p&gt;

&lt;p&gt;As technology advances and the use of web applications become increasingly prevalent, the risks associated with cybercrime also continue to grow. DAST helps protect your application from malicious users and ultimately saves you money by staying ahead of potential cyber threats and protecting sensitive data.&lt;/p&gt;

&lt;p&gt;If you are interested in DAST and how GuardRails can help, feel free to get in touch with &lt;a href="https://www.guardrails.io/book-a-demo/"&gt;Guardrails&lt;/a&gt;&lt;/p&gt;

</description>
      <category>dast</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
    <item>
      <title>Preventing and Managing Secrets Leaks</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Sat, 24 Jun 2023 02:42:46 +0000</pubDate>
      <link>https://dev.to/guardrails/preventing-and-managing-secrets-leaks-50ck</link>
      <guid>https://dev.to/guardrails/preventing-and-managing-secrets-leaks-50ck</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--b1bgWbF2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h320jdghcutrxz7seft7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--b1bgWbF2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/h320jdghcutrxz7seft7.jpg" alt="Secrets" width="800" height="469"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In 2022, over 10 million secrets were leaked into GitHub. For organizations, detecting and fixing secrets committed into source control has never been more important. This post will look at considerations when implementing secrets detection in your organization, including why:&lt;/p&gt;

&lt;p&gt;Preventing secrets leaks is important&lt;br&gt;
Secrets detected by tooling are bypassed by developers&lt;br&gt;
GuardRails can improve your security posture.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why is preventing secret leaks important?
&lt;/h2&gt;

&lt;p&gt;Protecting sensitive key material is vital to ensure continued reliability of your technology stack. The loss of authentication keys, tokens, and certificates can result in data breaches that affect ongoing business operations, the reputation of your organization, and ultimately prove very expensive.&lt;/p&gt;

&lt;h2&gt;
  
  
  Secrets leaks can be expensive
&lt;/h2&gt;

&lt;p&gt;The compromise of key material in one case has resulted in a loss of $14.8 million through API keys stolen by one attacker. 60% of participants in this study stated that their enterprise had suffered an important data leakage. In addition, the costs involved in the remediation of key leak incidents can include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Engineering time to determine how the key was leaked, the length of exposure, and services that use the material.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Understanding the impact of the compromise and rotating the previously used key by technical teams.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Managing the incident and communicating with your customers and stakeholders on how it affects your business.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s take a look at some of the reasons that this still remains an issue, and how GuardRails can help.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why are secret findings bypassed by developers?
&lt;/h2&gt;

&lt;p&gt;Many static analysis tools are available for developers to integrate into their software development lifecycle (SDLC) to detect secret key material that has been committed to a repository. The false positive rate of issues surfaced by these tools can be high, especially when matching with regular expressions on generic secrets patterns and, as we show, detection without verification is lacking. &lt;/p&gt;

&lt;h3&gt;
  
  
  Developers mark findings as false positives
&lt;/h3&gt;

&lt;p&gt;Despite the availability of static analysis tooling to detect sensitive key material that has been inadvertently checked into a repository, developers are inclined to classify issues as false positives. For example, in this case study, developers classified 50% of the warnings as false positives, which demonstrates that the detection tooling can be useful in alerting developers to key material, but results in creating additional work to verify if the finding is valid. This leads to the second component, where…&lt;/p&gt;

&lt;h3&gt;
  
  
  Detection without verification is not enough
&lt;/h3&gt;

&lt;p&gt;The additional manual effort this brings for developers introduces fatigue and a loss of confidence in the tooling. Security products should make releasing software easier, not harder and, when more false positives are raised this destroys trust in the software, changes attitudes to findings, and the utility of the tool starts to lose value. A different and more effective approach is needed.&lt;/p&gt;

&lt;h2&gt;
  
  
  The GuardRails approach to protecting secrets
&lt;/h2&gt;

&lt;p&gt;We provide developers with a security pipeline to detect secret key material that has been committed to a repository. Our workflow supports the detection and verification of key material so that clients can immediately know if the material is valid. This gives a clear signal to developers at the beginning of the development process that the material that has been added to a repository is valid, exposed, and provides guidance on remediation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Third-party integration verification
&lt;/h3&gt;

&lt;p&gt;To support the detection layer of secret key material, we have built integrations with commonly used third-party services to validate the liveness of keys and certificates. We attempt to authenticate with the detected material and use this to indicate to platform users whether the secret is live. This validation and authentication eliminates manual finding validation, helps to reduce developer fatigue, and builds confidence in the results.&lt;/p&gt;

&lt;p&gt;We continue to expand the integrations we have for our secrets detection pipeline. Currently, we cover a range of commonly used services, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cloud services like AWS, Azure, GCP&lt;/li&gt;
&lt;li&gt;Financial services providers like Stripe and SquareUp&lt;/li&gt;
&lt;li&gt;Productivity tools such as Slack, Dropbox, Microsoft Teams&lt;/li&gt;
&lt;li&gt;Emerging technologies in AI&lt;/li&gt;
&lt;li&gt;Development tooling including Ruby Gems, Postman, and TravisCI.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Protecting confidentiality of results
&lt;/h3&gt;

&lt;p&gt;When GuardRails verifies key material detected by our platform, we attempt to authenticate with the third-party service relevant to the secret. However, at no point do we attempt to read or change state, store your secret for our own consumption, or output the secret in any system log or event message.&lt;/p&gt;

&lt;h2&gt;
  
  
  Providing a clear signal
&lt;/h2&gt;

&lt;p&gt;The integration of a verification layer in our secrets detection pipeline makes it trivial for developers to understand whether key material is live. Feedback is provided via the GuardRails Dashboard, and on the developer’s PR for the validity of the detected key material. This gives a single pane of glass view to exposure of AppSec issues in code and secrets detection with verification.&lt;/p&gt;

&lt;h2&gt;
  
  
  Example detection and verification
&lt;/h2&gt;

&lt;p&gt;This is an example of a valid Ruby Gems secret that has been committed to a repository. The hard-coded secret is presented on the dashboard, and the Verification Status field shows the status to the developer that the key material is valid:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mjVMzR2G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gt5rmiwyf2tcvgw0wnw9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mjVMzR2G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gt5rmiwyf2tcvgw0wnw9.png" alt="Ruby Secrets" width="768" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Filtering results
&lt;/h2&gt;

&lt;p&gt;On the dashboard, it’s trivial to filter the secrets that are valid. This helps you to determine exactly which secrets have been leaked and should be rotated.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sxL4t8zd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ar5knw7wh8ol55rt60gq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sxL4t8zd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/ar5knw7wh8ol55rt60gq.png" alt="Filtering Secrets" width="768" height="302"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;As you’ve seen, integrating GuardRails into your software development lifecycle increases your security posture, and prevents secrets from being leaked into repositories. Combined with our AppSec and Infrastructure as Code (IaC) vulnerability scanning, we help to keep your organization secure. This workflow is available for you to test now with the free plan!&lt;/p&gt;

&lt;p&gt;Interested to learn more about how GuardRails can help your organization? Contact us here either to discuss how we can help or to &lt;a href="https://www.guardrails.io/book-a-demo/"&gt;schedule a demo&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>secretsmanagement</category>
      <category>devsecops</category>
      <category>secretleaks</category>
    </item>
    <item>
      <title>What Business Owners Can Learn From the Tesla Breach</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Sat, 24 Jun 2023 02:33:57 +0000</pubDate>
      <link>https://dev.to/guardrails/what-business-owners-can-learn-from-the-tesla-breach-1pld</link>
      <guid>https://dev.to/guardrails/what-business-owners-can-learn-from-the-tesla-breach-1pld</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mrHh144x--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j08vlfpzkhmlxdivz7jl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mrHh144x--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/j08vlfpzkhmlxdivz7jl.jpg" alt="Image description" width="800" height="469"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;GuardRails&lt;br&gt;
20 Jun 2023&lt;br&gt;
Data Breach Lessons&lt;/p&gt;

&lt;h2&gt;
  
  
  What happened?
&lt;/h2&gt;

&lt;p&gt;Tesla, the electric car maker known for its innovative self-driving features, has been hit by a massive data breach that exposed sensitive information of customers, employees, and business partners, as well as thousands of safety complaints regarding its driver assistance system. The data leak was reported by the German newspaper Handelsblatt, which received 100GB of confidential data from several informants who claimed to be former Tesla employees.&lt;/p&gt;

&lt;h2&gt;
  
  
  How many people were affected?
&lt;/h2&gt;

&lt;p&gt;According to Handelsblatt, the data set labelled “Tesla Files” contains tables with more than 100,000 names of former and current employees, including the social security number of the Tesla CEO, Elon Musk, along with private email addresses, phone numbers, salaries of employees, bank details of customers and secret details from production.&lt;/p&gt;

&lt;p&gt;The breach would violate the GDPR, the newspaper said. If such a violation was proved, Tesla could be fined up to 4% of its annual sales, which could be €3.26bn ($3.5bn).&lt;/p&gt;

&lt;h2&gt;
  
  
  What lessons can we learn and apply?
&lt;/h2&gt;

&lt;p&gt;The Tesla data leak is a wake-up call for all organizations that deal with sensitive data and rely on software to deliver their products or services. Data protection and security is not just a set of protocols to follow – it is a culture. &lt;/p&gt;

&lt;p&gt;Based on recent history, it does not seem like Tesla takes data protection seriously. A recent Reuters report showed that groups of Tesla employees privately shared via an internal messaging system sometimes highly invasive videos and images recorded by customers’ car cameras between 2019 and 2022.&lt;/p&gt;

&lt;p&gt;The breach highlights the importance of implementing DevSecOps practices throughout the software development lifecycle to ensure data privacy and security. Here are some recommended practices to prevent similar occurrences in the future:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Assess their current security posture and maturity level and identify gaps and areas for improvement&lt;/li&gt;
&lt;li&gt;Train and educate their teams on security best practices and principles&lt;/li&gt;
&lt;li&gt;Monitor and measure their security performance and outcomes regularly and continuously&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Tesla data leak is a reminder that data privacy and security are not optional or nice-to-have features in today’s digital world. They are essential for building trust with customers, complying with regulations and staying ahead of competitors. By embracing DevSecOps practices, organizations can ensure that they deliver secure software that meets customer needs while protecting their own reputation and assets.&lt;/p&gt;

</description>
      <category>telstra</category>
      <category>databreach</category>
    </item>
    <item>
      <title>What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Fri, 17 Mar 2023 04:53:43 +0000</pubDate>
      <link>https://dev.to/guardrails/whats-the-difference-between-appsec-software-security-cybersecurity-and-devsecops-48ff</link>
      <guid>https://dev.to/guardrails/whats-the-difference-between-appsec-software-security-cybersecurity-and-devsecops-48ff</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0h2ag2kibencq3b1tdg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0h2ag2kibencq3b1tdg.png" alt="DevSecOps and Cybersecurity"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This is a highly simplified drawing to help visualize the relationships between the four terms. As far as this author’s knowledge goes, the above is accurate within a DevSecOps organization: if you haven’t implemented DevSecOps, then that ring wouldn’t exist. With that in mind, all diagrammatical (and other) errors are purely the fault of this author.&lt;/p&gt;

&lt;p&gt;If you’ve been involved in computing or IT for longer than this week, you’ll have come across the terms AppSec, Software Security, DevSecOps, and cybersecurity. Unfortunately, you might often hear or read several being used interchangeably. As always, clarity is key and, in this post, we’ll explain each term, how they relate to each other, and, where applicable, provide examples to help solidify them in your mind. But first, why such confusion?&lt;/p&gt;

&lt;h2&gt;
  
  
  Confusion Reigns
&lt;/h2&gt;

&lt;p&gt;GuardRails is an Application Security (AppSec) platform, so that’s an excellent place to start. Here are three AppSec definitions to get your juices flowing: Cobalt, in their July 20, 2022 article, discusses how AppSec is a profession. In their November 8, 2022 piece, VMware defines AppSec as “…the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.” Third, and finally, TechTarget, in their January 25, 2022 piece, defines AppSec as “…the practice of using security software, hardware, techniques, best practices and procedures to protect computer applications from external security threats.”&lt;/p&gt;

&lt;p&gt;So if, like us, you’re confused, then join the club. Given a picture paints a thousand words and, as there’s no definitive answer or agreement (as yet), we went searching for one to clarify…&lt;/p&gt;

&lt;h2&gt;
  
  
  A Picture Paints a Thousand Words (When it Exists, That is)
&lt;/h2&gt;

&lt;p&gt;We couldn’t find one. That’s how clear the definition is! So, with the above in mind, we decided to create our own.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmwmtl7rz20obgiga2hri.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmwmtl7rz20obgiga2hri.png" alt="Difference Between DevSecOps and Cybersecurity"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is the Difference Between AppSec, Software Security, Cybersecurity, and DevSecOps?
&lt;/h3&gt;

&lt;p&gt;In our Internet-connected world, we’ll start with cybersecurity because that encompasses most of the other items (and most of the other items will use cybersecurity elements).&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Cybersecurity?
&lt;/h2&gt;

&lt;p&gt;“Cybersecurity is the protection of internet-connected systems such as hardware, software, and data from cyber threats.”.&lt;/p&gt;

&lt;p&gt;Any device that connects to the Internet requires cybersecurity protection. You will need to implement relevant security controls depending on which type of the seven types of cybersecurity involved:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Network Security – Securing the hardware and software components of the network, including perimeter devices, endpoints, routers, etc.&lt;/li&gt;
&lt;li&gt;Cloud Security – Securing data stored in the cloud.&lt;/li&gt;
&lt;li&gt;Endpoint Security – Involves physical devices, such as laptops and mobile phones that form the network endpoints.&lt;/li&gt;
&lt;li&gt;Mobile Security – Protecting sensitive information stored on/ transmitted by laptops, tablets, smartphones, etc.&lt;/li&gt;
&lt;li&gt;IoT Security – Protecting cloud-connected devices such as scanners, security cameras, and any tech that connects directly to the cloud.&lt;/li&gt;
&lt;li&gt;Application Security – Includes the processes involved with testing application security features to prevent security vulnerabilities/threats.&lt;/li&gt;
&lt;li&gt;Zero Trust –  a security framework that requires users to authenticate, authorize, and validate to access network components.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So that’s a brief overview of cybersecurity.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is DevSecOps?
&lt;/h2&gt;

&lt;p&gt;DevSecOps focuses on the integration of Development (Dev), Security (Sec), and Operations (Ops) into the software development process within your Software Development Life Cycle (SDLC).&lt;/p&gt;

&lt;p&gt;In essence, DevSecOps is the approach/methodology of designing, developing, deploying, and maintaining secure software with a focus on collaboration and automation. If you’re familiar with DevOps end-to-end practices and processes such as application development, continuous integration, and continuous deployment (CI/CD), then DevSecOps takes those processes and wraps them in an automated security process.&lt;/p&gt;

&lt;p&gt;Because DevSecOps covers all areas of software development, including how it ties in with architecture, platforms, hardware, networks, etc., it also encompasses cybersecurity, software security, and AppSec.&lt;/p&gt;

&lt;h3&gt;
  
  
  DevSecOps White Paper
&lt;/h3&gt;

&lt;p&gt;If you want to learn more about DevSecOps, our ‘How to build a DevSecOps Pipeline’ white paper will help. &lt;a href="https://www.guardrails.io/whitepapers/how-to-build-a-devsecops-pipeline/" rel="noopener noreferrer"&gt;You can download it for free here&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Software Security?
&lt;/h2&gt;

&lt;p&gt;Software security refers to the measures taken to protect computer programs and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Software security examples include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access control – Limiting access to a system or network based on the identity of the user or system.&lt;/li&gt;
&lt;li&gt;Intrusion detection and prevention – Using software or hardware to detect and prevent unauthorized access to a system or network.&lt;/li&gt;
&lt;li&gt; Vulnerability management – Identifying, assessing, and mitigating security vulnerabilities in software and systems.&lt;/li&gt;
&lt;li&gt;Security information and event management (SIEM) – A security management system that collects and analyzes security data from various sources to identify and respond to security incidents.&lt;/li&gt;
&lt;li&gt;Application security (AppSec) – Securing software applications from various threat types such as malware, SQL injection, cross-site scripting (XSS), etc. More on this below.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Types of devices that require software security
&lt;/h2&gt;

&lt;p&gt;Virtually every device that stores, processes, or transmits data can benefit from software security. As shown in Figure 1 above, devices include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Network devices – Including routers, switches, firewalls, and others that control and protect network traffic.&lt;/li&gt;
&lt;li&gt;Industrial control systems – Devices that control industrial processes such as manufacturing, power generation, and transportation.&lt;/li&gt;
&lt;li&gt;Medical devices – Pacemakers, insulin pumps, etc.
Internet of Things (IoT) devices – Smart home devices, security cameras, wearables, etc.&lt;/li&gt;
&lt;li&gt;Automotive devices – The electronic systems in cars, trucks, and other network-connected vehicles.&lt;/li&gt;
&lt;li&gt;Embedded systems – printers, televisions, and other consumer electronics that have network-connected embedded software.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What is Application Security?
&lt;/h2&gt;

&lt;p&gt;AppSec “is the practice of using security software, hardware, techniques, best practices, and procedures to protect computer applications from external security threats.”&lt;/p&gt;

&lt;p&gt;A subset of software security, AppSec is a critical element of the development process and is composed of different features, environments, types, and methods.&lt;/p&gt;

&lt;h2&gt;
  
  
  Application Security Features
&lt;/h2&gt;

&lt;p&gt;include:&lt;/p&gt;

&lt;p&gt;Authentication – Controls access and ensures users are who they say they are. Multi-Factor Authentication (MFA) adds an authentication layer and typically involves three items: something you know (a password), something you have (a device), and something you are (a fingerprint, facial recognition, etc.)&lt;br&gt;
Authorization – Determines what authenticated users can access and use once logged in. Authorization allows organizations to safeguard assets, secure data, mitigate security risks, etc.&lt;br&gt;
Encryption – Protects sensitive data from unauthorized persons.&lt;br&gt;
Logging – Creates a time-stamped trail of who accessed what, when, and how.&lt;br&gt;
Testing – Verifies that all controls are working correctly.&lt;/p&gt;

&lt;h2&gt;
  
  
  Application Security Environments
&lt;/h2&gt;

&lt;p&gt;With software, there are different types of AppSec environments, each with its own security concerns:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mobile – Mobile devices (and mobile apps) extend your security perimeter. They are increasingly vulnerable because they communicate over the Internet rather than private networks.&lt;/li&gt;
&lt;li&gt;Cloud – Involves shared resources and, because cloud-based data is especially vulnerable when transmitted across the Internet, will require additional security measures.&lt;/li&gt;
&lt;li&gt;Web – Web and web-based applications pose increased risks due to transmitting data between your local client, desktop browser, or mobile device, and the Internet-based server.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Application Security Test Types
&lt;/h2&gt;

&lt;p&gt;The types of AppSec testing and purposes are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Black box – Simulates an external attack. Black box testing tests the application’s end-to-end security, including application and server configurations, external integrations, etc.&lt;/li&gt;
&lt;li&gt;Grey box – Simulates a more sophisticated attack, such as where a privileged user (like an administrator) uses their advanced knowledge to exploit defenses.&lt;/li&gt;
&lt;li&gt;White box – The tester has full access to the application’s internal workings/code. One example is Static Application Security Testing (SAST), which we look at below.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Application Security Testing Methods
&lt;/h2&gt;

&lt;p&gt;AppSec testing methods include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Static Application Security Testing (SAST) – Is white box testing used to scan and identify vulnerabilities in source code. Automated SAST is cheap and quick to run and allows you to find and fix vulnerabilities early, thereby keeping pipeline costs to a minimum and making your application more secure.&lt;/li&gt;
&lt;li&gt;Dynamic Application Security Testing (DAST) – Is a black box automated testing method that allows you to mimic attacks to identify vulnerabilities in running applications using HTTP, HTTPS, Html, etc.&lt;/li&gt;
&lt;li&gt;Interactive Application Security Testing (IAST) – IAST combines elements of SAST (black box) and DAST (white box) to perform a grey box test that analyzes the entire application to detect security issues. This includes code, data flow information, runtime controls, responses, etc.&lt;/li&gt;
&lt;li&gt;Software Composition Analysis (SCA) – Analyzes and manages any open source libraries and components used in your application.&lt;/li&gt;
&lt;li&gt;Runtime Application Self-Protection (RASP) – Is run within and performs continuous security checks on the application itself. In doing so, it can respond to, and terminate, active attacks and alert your security teams to the live intrusion.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Application Security Testing and GuardRails
&lt;/h2&gt;

&lt;p&gt;GuardRails is a continuous application security verification platform that empowers modern development teams to find, fix and prevent vulnerabilities related to source code, open-source libraries, secrets management, and cloud configuration.&lt;/p&gt;

&lt;h2&gt;
  
  
  GuardRails Automates SAST and SCA
&lt;/h2&gt;

&lt;p&gt;GuardRails automates SAST and SCA at the code level by automatically scanning every code change and providing continuous security feedback. In conjunction with Just-In-Time (JIT) Training, this feedback helps developers create secure applications while educating and upskilling them. When security scans detect a vulnerability, the developer receives instant notification of the error, where it is, and guidance on how to fix it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;At a higher level, the boundaries between cybersecurity, DevSecOps, software security, and AppSec are dissolving. Naturally, this has led to confusion over each term’s definition, meaning, and application. However, when you delve into each and understand how they interconnect within the overall schema, the separation (albeit small) becomes more apparent and defined.&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>devsecops</category>
      <category>softwaresecurity</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>AppSec for Software Engineers</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Fri, 17 Mar 2023 04:26:40 +0000</pubDate>
      <link>https://dev.to/guardrails/appsec-for-software-engineers-21ff</link>
      <guid>https://dev.to/guardrails/appsec-for-software-engineers-21ff</guid>
      <description>&lt;h2&gt;
  
  
  What is AppSec?
&lt;/h2&gt;

&lt;p&gt;The process of locating, fixing, and preventing security flaws at the application level in hardware, software, and development processes is referred to as application security, or AppSec for short. It includes guidance on measures for application design and development through the whole lifecycle, including after the application has launched. &lt;/p&gt;

&lt;p&gt;Application security is crucial because apps in today’s world are frequently accessible through a variety of networks and connected to the cloud, which increases the applications’ susceptibilities to security breaches and attacks. There is an ever-increasing amount of pressure and motivation to maintain security throughout the entire application stack. This is due, in part, to the increased frequency with which hackers target applications with their exploits in comparison to times gone by. Testing for application security can uncover any holes that exist at the application level, which can help avoid attacks like this.&lt;/p&gt;

&lt;h2&gt;
  
  
  AppSec Best Practices
&lt;/h2&gt;

&lt;p&gt;The best practices for application security should be implemented right from the beginning of the software development lifecycle, and the whole product team should commit to using them.&lt;/p&gt;

&lt;p&gt;In order to ensure the safety of your software applications, make sure to follow these best practices:&lt;/p&gt;

&lt;p&gt;Create an application security risk profile in order to determine probable security flaws and vulnerabilities.&lt;br&gt;
Locate and fix any security flaws that may exist in the software program you are using.&lt;br&gt;
Find and fix the security flaws that are present in open-source and third-party software.&lt;br&gt;
Make sure you’re using the appropriate application security tools.&lt;br&gt;
Make sure that your staff receives training on application security.&lt;br&gt;
The use of best practices for application security will reduce business risks, protect your customers, and safeguard data.&lt;/p&gt;

&lt;h2&gt;
  
  
  AppSec Standards
&lt;/h2&gt;

&lt;p&gt;The identification, prevention, and elimination of software flaws that might compromise software security are the goals of secure coding standards. These standards take the form of rules and recommendations:&lt;/p&gt;

&lt;p&gt;CERT: CERT is a collection of safe coding standards that target insecure coding techniques and undefined behaviors in C, C++, and Java that may lead to security issues. These standards were developed by the Computer Emergency Readiness Team (CERT).&lt;br&gt;
The Common Weakness Enumeration (CWE) is a list that may be used to identify software security flaws in C, C++, Java, and C#.&lt;br&gt;
DISA-STIG is an acronym that stands for the Defense Information Systems Agency’s Software Technical Implementation Guide.&lt;br&gt;
The Open Web Application Security Project, also known as OWASP, ranks the most significant threats to the security of web applications. The OWASP Top Ten, which lists the ten threats to application security that are deemed to be the most serious, is the organization’s most widely used resource.&lt;br&gt;
ISO/IEC TS 17961 is a safe coding standard for C that was developed to identify vulnerabilities in computer security.&lt;br&gt;
At an early stage in the development cycle, a static code analyzer should be utilized to enforce safe coding standards. This will provide the best possible resolution to any potential security issues.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where’s AppSec Going
&lt;/h2&gt;

&lt;p&gt;The State of Application Security was published by Forrester in the year 2022. In this paper, researchers observed trends and made estimates regarding the future of application security. When one considers the software development life cycle (SDLC), “shifting left” is always and must be the primary focus of their attention. This makes perfect sense: you want to uncover security flaws sooner so that you may save time and money and reduce the amount of risk exposure in production. However, if there is one thing that people in the year 2022 have learned as a result of recent emergent threats, it is that it does not matter how hard you try to secure your applications before they go into production; you still need to have runtime protections in place for the applications that are critical to your business. According to the findings of the Forrester analysis, the concept of “shift everywhere,” which encompasses shifting in both the left and right directions, appears to be gaining acceptance. According to research by Forrester, 58% of senior security decision-makers around the world want to raise the amount of money they allocate to application security this year. &lt;/p&gt;

&lt;p&gt;The second point is that application programming interfaces (APIs) are expanding, and so is the risk associated with using them. APIs, or application programming interfaces, are what allow modern programs to talk to one another. Almost all current applications make use of one or more application programming interfaces (APIs), and some even function as APIs themselves. The number of API calls made throughout the world continues to increase, and cybercriminals have taken note of this trend. According to Forrester’s findings, the volume of malicious API traffic nearly quadrupled during the timeframe of December 2020 and January 2021.&lt;/p&gt;

&lt;p&gt;APIs are now unequivocally a part of the expanding attack surface of companies, and it can be expected that their significance will continue to increase over the course of the next several years. This indicates that they should be an essential part of any security effort. There are several different approaches to securing APIs, one of which is to actively scan and monitor them for any harmful behavior that may occur.&lt;/p&gt;

&lt;h2&gt;
  
  
  AppSec with GuardRails
&lt;/h2&gt;

&lt;p&gt;GuardRails provides complete protection for software, from the source code to the cloud. GuardRails will improve your development processes while also providing you with enhanced security capabilities. We eliminate noise and assist you in writing code that is safer, which enables you to move more quickly and efficiently. If you integrate security into your software development lifecycle, your team will be able to focus their efforts where they will have the greatest impact. We take care to prioritize and address any severe security flaws as soon as they are discovered, relieving you of any unnecessary concerns. It doesn’t matter what version control system, programming language, framework, database, or integrated development environment you use; the integration inside your tech stack is quick and seamless from the minute you start coding. Adaptable enterprise application security that protects you from beginning to end and all the steps in between. &lt;/p&gt;

&lt;p&gt;We adapt to your specific security requirements and include the enterprise features you’re searching for. The sophisticated smart scanning technology utilized by GuardRails performs code change evaluations directly within your workflow. Any vulnerabilities can be patched immediately after they are introduced. We do the scan in the background while keeping a low profile, and we assist you in finding significant security flaws as soon as they appear in your code rather than after they have been released to the public. You won’t hear from GuardRails until it’s absolutely necessary.&lt;/p&gt;

&lt;p&gt;Through &lt;a href="https://www.guardrails.io/why-choose-guardrails/just-in-time-training/"&gt;Just-In-Time training&lt;/a&gt;, we explain immediately why a vulnerability is significant and walk you through how to simply correct it. This not only makes your code safer, but it also helps you improve your skills in order to stop making the same mistakes in the future. Suddenly, application security has become an integral component of your software development cycle rather than an extra step that must be taken. Utilizing the insights and role-specific data provided by GuardRails further improves both the speed and security of your system.&lt;/p&gt;

&lt;p&gt;You can &lt;a href="https://dashboard.guardrails.io/signup"&gt;try GuardRails for free&lt;/a&gt; any time and see how it can make your life easier.&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>softwareengineers</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>A Guide to Effective Threat Modeling</title>
      <dc:creator>Nuk</dc:creator>
      <pubDate>Thu, 10 Nov 2022 08:28:58 +0000</pubDate>
      <link>https://dev.to/guardrails/a-guide-to-effective-threat-modeling-4oig</link>
      <guid>https://dev.to/guardrails/a-guide-to-effective-threat-modeling-4oig</guid>
      <description>&lt;p&gt;Threat modeling is an excellent way to make sure your products are built safely by identifying threats and defining countermeasures to prevent them. It is a practical method for protecting your application during all stages of development. However, the majority of conventional threat modeling techniques are labor-intensive. Therefore, using a suitable modeling technique should be in your best interest. &lt;/p&gt;

&lt;p&gt;Possessing the resources required to threat model your entire software portfolio should not be a last-minute decision. Rather, it should be a top priority to guarantee a successful software development process.&lt;/p&gt;

&lt;p&gt;In this article, we’ll discuss the benefits of threat modeling and the different steps involved in the process. We’ll also provide tips for getting started with threat modeling and making the most of this valuable security technique.&lt;/p&gt;

&lt;h1&gt;
  
  
  What Is Threat Modeling?
&lt;/h1&gt;

&lt;p&gt;Threat modeling helps you to understand your vulnerabilities. It is the process of identifying potential threats to your business and designing strategies and solutions to mitigate those threats. A threat model typically includes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Asset identification.&lt;/li&gt;
&lt;li&gt;Identifying the risks associated with those assets.&lt;/li&gt;
&lt;li&gt;Developing an action plan to mitigate each of the identified threats.&lt;/li&gt;
&lt;li&gt;Validating and verifying the success of the actions taken.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For best results, threat modeling should be carried out as a proactive strategy before the launch of the product rather than as a reactionary measure after design and development.&lt;/p&gt;

&lt;h1&gt;
  
  
  Benefits of Threat Modeling
&lt;/h1&gt;

&lt;p&gt;Threat modeling can provide some benefits for your business, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improved Security: By identifying potential threats and designing strategies to mitigate them, threat modeling can help to improve the overall security of your business.&lt;/li&gt;
&lt;li&gt;Reduced Costs: By taking a proactive approach to threat modeling, you can reduce the costs associated with responding to and recovering from attacks.&lt;/li&gt;
&lt;li&gt;Improved Decision-Making: Threat modeling can help you make informed decisions about where to allocate resources for security purposes.&lt;/li&gt;
&lt;li&gt;Improved Risk Assessment: One of the biggest benefits of threat modeling is that it helps organizations assess risk more accurately. Risk analysis is important because organizations can identify and evaluate all potential ways an asset could be hacked. This is known as anticipated vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  The Different Steps of Threat Modeling
&lt;/h1&gt;

&lt;p&gt;The threat modeling process typically involves the following steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify Assets: The first step is to identify the assets that are most critical to your business and that would be most impacted by a security breach. These assets could include customer data, financial information, or proprietary information.&lt;/li&gt;
&lt;li&gt;Identify Vulnerabilities: Once you’ve identified your assets, you need to identify the vulnerabilities that could expose those assets to attack. These vulnerabilities could include weak passwords, unpatched software, or exposed ports.&lt;/li&gt;
&lt;li&gt;Identify Threats: Next, you need to identify the specific threats that could exploit those vulnerabilities. These threats could include malware, phishing attacks, or denial-of-service attacks.&lt;/li&gt;
&lt;li&gt;Determine Likelihood and Impact: Once you’ve identified the threats, you need to determine the likelihood that each threat will occur and the impact it could have if it did occur. &lt;/li&gt;
&lt;li&gt;Create Mitigation Strategies: Finally, you need to create mitigation strategies for the threats with the highest likelihood and impact. These strategies could involve implementing security controls, such as firewalls or intrusion detection systems, or developing incident response plans.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  How To Get Started With Threat Modeling
&lt;/h1&gt;

&lt;p&gt;If you’re new to threat modeling, there are a few things you can do to get started:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Educate Yourself: One of the best things you can do is educate yourself about threat modeling. Read articles, attend conferences, and take courses. The more you know about threat modeling, the better equipped you’ll be to implement it effectively.&lt;/li&gt;
&lt;li&gt;Use a Threat Modeling Framework: There are a number of different threat modeling frameworks you can use to guide your process. However, threat modeling can be done in five simple steps: define, diagram, identify, mitigate, and validate.&lt;/li&gt;
&lt;li&gt;Work With Experts: Threat modeling can be complex, so don’t hesitate to reach out to experts for help. There are several options available, including hiring a consultant or using an online service, which provides threat modeling tools and resources. &lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  Tips for Creating an Effective Threat Model
&lt;/h1&gt;

&lt;p&gt;There are a few things you can do to create an effective threat model:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Be Comprehensive: Make sure you consider all potential threats, not just the most obvious ones. Attackers are constantly finding new ways to exploit vulnerabilities, so it’s vital to stay ahead of the curve. Start with a small scope and gradually expand it over time.&lt;/li&gt;
&lt;li&gt;Be Realistic: Don’t try to design the perfect security solution. No system is hundred percent secure, so focus on reducing the risks posed by the most likely and impactful threats. &lt;/li&gt;
&lt;li&gt;Test Your Assumptions: After you’ve created your threat model, test your assumptions by conducting vulnerability assessments and penetration tests. This will help you  identify any gaps in your defenses and make necessary adjustments.&lt;/li&gt;
&lt;li&gt;Update Regularly: Threats are constantly changing, so it’s important to update your threat model on a regular basis especially when there are significant changes to your environment such as the addition of new assets or the introduction of new technologies. At a minimum, you should make threat modeling a part of your process framework.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  The Importance of Collaboration in Threat Modeling
&lt;/h1&gt;

&lt;p&gt;Threat modeling is not a solo activity that only involves the development team. It also requires collaboration with the stakeholders across the organization to become effective. Collaboration within the development team can be done after Sprint Planning when developers begin working on a particular task or during a test condition workshop. Stakeholders can then be involved during the Sprint Review to inspect the Sprint output and determine future modifications. The following tips can help you to encourage collaboration:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Get Buy-In From Upper Management: Threat modeling can be resource intensive, so it’s important to get buy-in from upper management before starting the process. This will help to ensure that you have the necessary resources and support.&lt;/li&gt;
&lt;li&gt;Involve All Relevant Stakeholders: Make sure you involve all relevant stakeholders in the threat modeling process. This includes people from different departments, such as IT, security, and operations.&lt;/li&gt;
&lt;li&gt;Use Collaborative Tools: There are a number of collaborative threat modeling tools available. These tools can help to streamline the threat modeling process and make it easier for stakeholders to contribute.&lt;/li&gt;
&lt;li&gt;Communicate Regularly: Regular communication is essential for successful threat modeling. Make sure you keep all stakeholders up to date on your progress and solicit feedback regularly.&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>threatmodeling</category>
    </item>
  </channel>
</rss>
