Asw131
Contents
Application Security Weekly Episode #131 - November 23, 2020
Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe
1. Threat Modeling Deep Dive - 12:30 PM-01:00 PM
Announcements
-
In our upcoming webcasts & technical trainings, you will learn how to build a risk-based vulnerability management program, how to prevent phishing scams, and how to move beyond vulnerability scan to vulnerability fix! Visit https://securityweekly.com/webcasts to see what we have coming up, or visit securityweekly.com/ondemand to view our previously recorded webcasts!
Description
We threat model every day without realizing it. And, of course, we often threat model with systems and products within our organizations. So how formal does our approach need to be? How do we best guide the "what could go wrong" discussion with DevOps teams? And what's a sign that we're generating useful threat models?
Articles
- https://www.threatmodelingmanifesto.org
- https://securityboulevard.com/2020/05/data-security-and-threat-models/
- https://speakerdeck.com/abhaybhargav/agile-threat-modeling-as-code
Hosts
Adrian Sanabria's Content:
Template:ASW131TopicAdrianSanabria
John Kinsella's Content:
Template:ASW131TopicJohnKinsella
Mike Shema's Content:
2. Drupal Flaws, DevSecOps Implementation, & Cloud Native Security White Paper - 01:00 PM-01:30 PM
Announcements
-
Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe
-
Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul’s Security Weekly live on Youtube! Visit https://securityweekly.com/unlocked to view the agenda and register for free!
Description
In the Application Security News, a manifesto highlights principles and values for threat modeling, the CNCF releases a Cloud Native Security Whitepaper, Microsoft put security in the CPU with Pluton, mass scanning for secrets, ancient flaws resurface in Drupal, and steps for implementing source composition analysis!
Hosts
Adrian Sanabria's Content:
Articles
John Kinsella's Content:
Articles
Mike Shema's Content:
Articles
- Threat Modeling Manifesto encourages more practical modeling with principles to make the results meaningful.
- Greybox Automatic Exploit Generation for Heap Overflows in Language Interpreters encourages a hybrid of human and automation approaches to discover and attack flaws in our code.
- Announcing the Cloud Native Security White Paper encourages an understanding of security principles and how to apply them to each phase of the cloud application lifecycle.
- Meet the Microsoft Pluton processor – The security chip designed for the future of Windows PCs, which encourages more trusted boot and secure secret handling to better adhere to The Seven Properties of Highly Secure Devices.
- DevSecOps Implementation: Source Composition Analysis encourages a smart evaluation of how to control your software supply chain.
- Botnets have been silently mass-scanning the internet for unsecured ENV files encourages better storage of secrets outside of text files.
- Drupal sites vulnerable to double-extension attacks, encouraging us to remember that old vulns are destined for re-invention.