{"id":113,"date":"2020-10-14T03:36:10","date_gmt":"2020-10-14T03:36:10","guid":{"rendered":"http:\/\/thecloudmarathoner.com\/?p=113"},"modified":"2021-03-18T03:16:53","modified_gmt":"2021-03-18T03:16:53","slug":"starting-points-in-devsecops-journey","status":"publish","type":"post","link":"https:\/\/www.thecloudmarathoner.com\/index.php\/2020\/10\/14\/starting-points-in-devsecops-journey\/","title":{"rendered":"Starting points in DevSecOps journey"},"content":{"rendered":"\n<p>Hello friends,<\/p>\n\n\n\n<p>During my journey to become a Microsoft Azure Security professional, I have compiled set of useful resources in addition to the exam materials. These resources do complement cloud and application security with open-source tooling, and a book that is much needed for success.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/wp-content\/uploads\/2021\/03\/what-is-devsecops-1024x538.png\" alt=\"\" class=\"wp-image-115\" srcset=\"\/wp-content\/uploads\/2021\/03\/what-is-devsecops-1024x538.png 1024w, \/wp-content\/uploads\/2021\/03\/what-is-devsecops-300x158.png 300w, \/wp-content\/uploads\/2021\/03\/what-is-devsecops-768x403.png 768w, \/wp-content\/uploads\/2021\/03\/what-is-devsecops-1536x806.png 1536w, \/wp-content\/uploads\/2021\/03\/what-is-devsecops-1200x630.png 1200w, \/wp-content\/uploads\/2021\/03\/what-is-devsecops.png 1800w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I am excited to share this with my network and DevSecOps enthusiasts \ud83d\ude42<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><a href=\"https:\/\/bolt.whitesourcesoftware.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">WhiteSource Bolt<\/a>&nbsp;&#8211; is a #free developer tool for finding and fixing open source vulnerabilities.<\/li><li><a href=\"https:\/\/find-sec-bugs.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Find Security Bugs<\/a>&nbsp;&#8211; it is a SpotBugs plugin for security audits of Java web applications &#8211;&nbsp;<a href=\"https:\/\/find-sec-bugs.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/find-sec-bugs.github.io\/<\/a><\/li><li><a href=\"https:\/\/owasp.org\/www-project-zap\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Zed Attack Proxy<\/a>&nbsp;(ZAP) &#8211; one of the most popular free web security tool, actively maintained by a dedicated international team of volunteers &#8211;&nbsp;<a href=\"https:\/\/owasp.org\/www-project-zap\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/owasp.org\/www-project-zap\/<\/a><\/li><li><a href=\"http:\/\/sqlmap.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sqlmap&nbsp;<\/a>&#8211; is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers &#8211;&nbsp;<a href=\"http:\/\/sqlmap.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/sqlmap.org\/<\/a><\/li><li><a href=\"https:\/\/openvas.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenVAS&nbsp;<\/a>&#8211; Open Vulnerability Assessment Scanner is a full-featured vulnerability scanner. Its capabilities include unauthenticated testing, authenticated testing, various high level and low level Internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test. &#8211;&nbsp;<a href=\"https:\/\/openvas.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/openvas.org\/<\/a><\/li><li><a href=\"https:\/\/tools.kali.org\/information-gathering\/recon-ng\" target=\"_blank\" rel=\"noreferrer noopener\">Recon-ng&nbsp;<\/a>&#8211; is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly &#8211;&nbsp;<a href=\"https:\/\/tools.kali.org\/information-gathering\/recon-ng\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tools.kali.org\/information-gathering\/recon-ng<\/a><\/li><li><a href=\"https:\/\/github.com\/OWASP\/glue\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Glue<\/a>&nbsp;&#8211; is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools &#8211;&nbsp;<a href=\"https:\/\/github.com\/OWASP\/glue\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/OWASP\/glue<\/a><\/li><li><a href=\"https:\/\/github.com\/devsecops\/awesome-devsecops\" target=\"_blank\" rel=\"noreferrer noopener\">Awesome DevSecOps book<\/a>. Inspired by the awesome-* trend on GitHub. This is a collection of documents, presentations, videos, training materials, tools, services and general leadership that support the DevSecOps mission. These are the essential building blocks and tidbits that can help you to arrange for a DevSecOps experiment or to help you build out your own DevSecOps program.<\/li><li><a href=\"https:\/\/github.com\/wickett\/lambhack\" target=\"_blank\" rel=\"noreferrer noopener\">#lambhack<\/a>&nbsp;is A vulnerable serverless lambda application. This is certainly a bad idea to base any coding patterns of what you see here. It allows you to take advantage of our tried and true application security problems, namely arbitrary code execution, XSS, injection attacks and more.<\/li><li><a href=\"https:\/\/www.blackducksoftware.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Black Duck&nbsp;<\/a>is a commercial alternative to WhiteSource Bolt. It helps to manage the risks that come with the use of open source. Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes.<\/li><li><a href=\"https:\/\/owasp.org\/www-project-honeypot\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Honeypot-Project<\/a>. Goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Based around the earlier OWASP\/WASC Distributed Web Honeypots Project.<\/li><li>Open Source Honeypots That Detect Threats For Free. You could read details on this&nbsp;<a href=\"https:\/\/www.smokescreen.io\/practical-honeypots-a-list-of-open-source-deception-tools-that-detect-threats-for-free\" target=\"_blank\" rel=\"noreferrer noopener\">interesting post<\/a>.<\/li><\/ol>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;in noway this presents a complete guide. However, I hope it will guide your project into a more successful DevSecOps state.<\/p>\n\n\n\n<p>I do encourageto\u00a0<strong>comment and share<\/strong>\u00a0your tips and resources here. This will ultimately help every community member to become a better security professional. Thanks!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"984\" height=\"555\" src=\"\/wp-content\/uploads\/2021\/03\/1593183492240.png\" alt=\"\" class=\"wp-image-114\" srcset=\"\/wp-content\/uploads\/2021\/03\/1593183492240.png 984w, \/wp-content\/uploads\/2021\/03\/1593183492240-300x169.png 300w, \/wp-content\/uploads\/2021\/03\/1593183492240-768x433.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure><\/div>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_113\" class=\"pvc_stats all  \" data-element-id=\"113\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello friends, During my journey to become a Microsoft Azure Security professional, I have compiled set of useful resources in addition to the exam materials. These resources do complement cloud and application security with open-source tooling, and a book that is much needed for success. I am excited to share this with my network and &hellip; <a href=\"https:\/\/www.thecloudmarathoner.com\/index.php\/2020\/10\/14\/starting-points-in-devsecops-journey\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Starting points in DevSecOps journey&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,15],"tags":[],"class_list":["post-113","post","type-post","status-publish","format-standard","hentry","category-azure-devops","category-security-governance"],"_links":{"self":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=113"}],"version-history":[{"count":1,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/113\/revisions"}],"predecessor-version":[{"id":116,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/113\/revisions\/116"}],"wp:attachment":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}