Skip to content

Latest commit

 

History

History
153 lines (108 loc) · 13.9 KB

File metadata and controls

153 lines (108 loc) · 13.9 KB
DSOMM User Day 2024

Description

In this combined User Day you will learn & have the chance to discuss with peers about two of OWASP’s major projects: DevSecOps Maturity Model (DSOMM) and Juice Shop!

In the morning, explore techniques for delivering effective secure coding workshops using Juice Shop. Then, in the afternoon, discover strategies for tailoring application security initiatives with the DevSecOps Maturity Model (DSOMM).

OWASP Juice Shop is - even after 10 years - still probably the most modern and sophisticated insecure web application. It encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws, packaged in a realistic and fully functional web shop. We will offer the following sessions about Juice Shop: Beginner-friendly introduction session to the project, its features, and its use cases Fun live demo of a very practical XSS exploit Introduction of a way to run Juice Shop conveniently from an on-brand LEGO brick tower filled with Raspberry Pis Fully hosted just-for-fun (and bragging rights) Capture the Flag event

Finally, you will have the chance to ask us any questions you may still have well into and during the lunch break!

The OWASP DSOMM User Day is an event centered on application security programs and related topics for startups and enterprises. It features a talk on building and optimizing AppSec programs, emphasizing custom organizational maturity models. The event includes a discussion on AppSec program experiences, as well as a presentation on using OWASP secureCodeBox for automating dynamic scans. Two workshops are offered: one on utilizing the DSOMM application to customize and distribute AppSec programs, and another on the Application and Vulnerability Maturity Model. Throughout the event, there's a focus on practical implementation, automation, and maturity models in the context of cloud and application security.

Location

Hyatt Regency San Francisco Address: 5 Embarcadero Center San Francisco, CA 94111 United States Room: To be announced.

Agenda

Time Title Speaker
9:00 Welcome: Juice Shop Morning Björn Kimminich & Timo Pagel
9:05 Juice Shop Introduction Björn Kimminich
09:30 Shake Logger XSS Demo Timo Pagel
09:45 Multi Juicer Introduction Jannik Hollenbach
10:30 Just-for-fun-CTF w/ Multi Juicer Jannik Hollenbach
12:30 Lunch Break (w/ Juice Shop Ask-us-Anything Session) Björn Kimminich & Jannik Hollenbach & Timo Pagel
13:30 Welcome: DSOMM Afternoon Björn Kimminich & Timo Pagel
13:45 Workshop: Application and Vulnerability maturity Model (VMM) - DSOMM Map Francesco Cipollone
15:00 Break Break
15:30 DSOMM Live Assessment for the OWASP Juice Shop Application Björn Kimminich & Jannik Hollenbach & Timo Pagel
16:15 Reach your Dynamic Depth with OWASP secureCodeBox Jannik Hollenbach
17:15 Application Security Program Experiences / Ask Anything Brook Schoenfield & Timo Pagel
18:15 Wrap Up Timo Pagel

Talk Descriptions

Juice Shop Introduction

In the brief session, you will learn all the basics of the OWASP Juice Shop project: Why it exists, what it can do, where you can get it from, and how to get it running! This session will make sure that newcomers and experts alike can enjoy and follow in the subsequent Juice Shop sessions!

Shake Logger XSS Demo

Cross-Site Scripting (XSS) demonstrations in secure coding training often rely on simple alert boxes, which can understate the true risks of this vulnerability. This session will show you how to effectively illustrate the damage potential of XSS to both developers and non-technical audiences, providing a more realistic and compelling demonstration of its impact.

Multi Juicer Introduction

Running CTFs and security trainings with OWASP Juice Shop is usually quite tricky, as Juice Shop isn't intended to be used by multiple users at the same time. MultiJuicer is a Juice Shop sub-project designed to make running trainings and CTFs with Juice Shop as easy and effective as possible. This session introduces the project and provides tips and tricks for setting it up in various cloud or on-prem environments.

Just-for-fun CTF w/ MultiJuicer

In this session, we will use MultiJuicer to host a short CTF on a live MultiJuicer environment to demonstrate how it can be used for trainings and CTFs. This will be a hands-on session, so be sure to bring your laptops!

Application Security Program Experiences / Ask Anything

Brook and Timo will talk about their experiences with Application Security Programs. Everyone is invited to join the conversation. Please bring your questions!

DSOMM Live Assessment for the OWASP Juice Shop Application

In this session, Timo will perform an assessment of the OWASP Juice Shop by interviewing other Juice Shop Core Members by filling out custom yaml files. Learn how to lead a DSOMM interview and at the same time fill out the DSOMM yaml files to document the assessment.

Reach your Dynamic Depth with OWASP secureCodeBox

Implementing automated scanning for applications within an organization presents a complex task due to various factors. While configuring the scans themselves poses a challenge (DSOMM subdimension "Dynamic depth for applications"), interpreting and utilizing the resulting data in a meaningful way is often even more challenging (DSOMM subdimension "Consolidation").

This presentation aims to provide guidance on how to utilize the OWASP secureCodeBox project as a tool to automate dynamic scans, leveraging tools such as ZAP, Nuclei, and SSLyze. Specifically, it will demonstrate how to either schedule regular scans or automatically create them via the AutoDiscovery feature of the secureCodeBox. The talk will also highlight the ability to utilize the secureCodeBox for automated creation of scans on Kubernetes deployments.

Furthermore, this presentation will showcase how the secureCodeBox can be used to automatically upload and organize scan results to OWASP DefectDojo, streamlining your security workflow.

Presentation slides

Workshop: Application and Vulnerability maturity Model (VMM) - DSOMM Map

Organizations face an ever-increasing risk of cyberattacks and data breaches. Vulnerabilities are getting discovered faster than ever, with a 34% YoY increase of vulnerability discovery. Vulnerabilities are often tackled as they come from security scanners, leading to burnout of security professionals, with 50% of security engineers considering changing their profession entirely. This workshop explores the vulnerability management process that applies to application, cloud, and infrastructure security.

To mitigate these risks, vulnerability management and triage have become essential components of an effective cybersecurity program. Vulnerability triage, in particular, plays a critical role in identifying, prioritizing, and remediating vulnerabilities to minimize the organization's attack surface across applications, cloud and infrastructure. However, the process of vulnerability triage is not a one-size-fits-all approach and requires a maturity model that reflects the organization's current state of readiness. In this workshop, you will explore the evolution of vulnerability management and triage process maturity and how organizations can enhance their capabilities to manage and mitigate cybersecurity risks effectively.

Why we created the vulnerability management process? We created the vulnerability maturity model to provide a quick and easy assessment method to define where you are in the vulnerability assessment process from triage. The VMM is mapped back to both SAMM, and DSOMM.

Presentation Slides

Speakers

Bio Brook

Brook

Books by Brook S.E. Schoenfield include Building In Security At Agile Speed (Auerbach, 2021, co-authored with James Ransome), Secrets Of A Cyber Security Architect (Auerbach, 2019) and Securing Systems: Applied Security Architecture and Threat Models (CRC Press, 2015). He co-authored The Threat Modeling Manifesto (2020), Threat Modeling Capabilities (2023), Avoiding the Top 10 Security Design Flaws (IEEE, 2014) and Tactical Threat Modeling (SAFECode, 2017). He has taught 100’s of security architects, and 1000’s have attended his threat modelling trainings. He technically led five AppSec/software security programs and 4 consulting practices. Currently, Mr. Schoenfield works with organizations to improve their software security practices as CTO and Chief Security Architect at Resilient Software Security. He also teaches at the University of Montana. He regularly speaks at conferences and appears in podcasts/webinars. Please see https://www.linkedin.com/in/brookschoenfield/ or brookschoenfield.com for details.

References LinkedIn Website

Bio Francesco

Francesco Francesco is a seasoned entrepreneur, CISO & Founder of the code to runtime Contextual-Based Actionable ASPM platform Phoenix Security, author of several books, host of multi-award Cyber Security & Cloud Podcast, speaker and known in the cybersecurity industry and recognized for his visionary views. He currently serves as in the board of UK&I Cloud Security Alliance Chapter,. Francesco Has appeared in several publication like Forbes, Helpnet Security, Hacker noon and interviewed as part of Forbes, Il fatto quotidiano and many other newspapers. Francesco is a faculty member at IANS on application security and cloud security. Francesco is often featured in popular podcast like Application Security weekly, down the rabbit hole, Cloud Security Podcast, appsec weekly. Francesco is frequently speaking at conferences nationally and internationally, Appsec Cali, open security summit, Cyber security & Cloud Expo, Previously, Francesco headed HSBC’s application and cloud security and was Senior Security Consultant at AWS. Francesco has been keynoting at global conferences and has authored and co-authored several books, whitepapers, Outside of work, you can find me running marathons, snowboarding on the Italian slopes, and enjoying single malt whiskeys in one of my favourite London clubs.

References Linkedin Podcast Books Research Whitepapers Blog Press

Bio Jannik

Jannik Hollenbach

Jannik Hollenbach is a Software Security Engineer at iteratec GmbH, working on and with open source security testing tools to continuously detect security vulnerabilities in the companies software and systems.

He is also a member of the OWASP secureCodeBox & OWASP Juice Shop project teams.

References Github Mastadon iteratec

Bio Timo

Timo With over 20 years of experience in DevSecOps, security, and web development, Timo Pagel is a freelance consultant committed to helping clients achieve reliable and secure cloud solutions. Holding CCSP and CEH certifications, Timo possesses vast knowledge secure design and application security programs.

As a DevSecOps architect, Timo collaborates with multiple organizations to design, implement, and monitor best security practices, workflows automation, and integrate security testing tools.

Timo loves Open Source and is the leader of the OWASP DevSecOps Maturity Model (DSOMM).

Additionally, Timo provides training and mentorship on security in web applications, both as a freelancer and a university lecturer. Timo's mission is to empower clients and students with the skills & knowledge to build and maintain secure web applications.

References LinkedIn Github AppSec Program PagelShield

Bio Björn

Bjoern Bjoern Kimminich works as Product Group Lead Application Ecosystem at Kuehne + Nagel, responsible – among other things – for the Application Security program in the corporate IT. He is an OWASP Lifetime Member, the project leader of the OWASP Juice Shop, and a co-chapter leader for the OWASP Germany Chapter. Björn also currently chairs the OWASP Project Committee.

References LinkedIn Github Twitter Mastodon