• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Codemotion Magazine

We code the future. Together

  • Discover
    • Events
    • Community
    • Partners
    • Become a partner
    • Hackathons
  • Magazine
    • Backend
    • Frontend
    • AI/ML
    • DevOps
    • Dev Life
    • Soft Skills
    • Infographics
  • Talent
    • Discover Talent
    • Jobs
    • Manifesto
  • Companies
  • For Business
    • EN
    • IT
    • ES
  • Sign in

Cate LawrenceSeptember 2, 2020

Security Is Not Just the Responsibility of the Security Manager

Cybersecurity
facebooktwitterlinkedinreddit

The following article was inspired by some of the best talks we had the opportunity to host during our offline conferences over the last few years. Together, they offer a broader view of the aspects related to Security.

We have committed ourselves to offer you more interesting talks like the followings in spite of that COVID-19 outbreak. Online conferences have become Codemotion’s new means of choice. If you are interested in organising your online event, have a read at this article on the best tools for planning and running a virtual conference.

Recommended article
November 25, 2024

The Most Common Passwords of 2024: We’ve All Used Them at Least Once

Codemotion

Codemotion

Cybersecurity
Table Of Contents
  1. What is security?
  2. You are the weakest link
  3. Security hits in unexpected places like API attacks
  4. Zero trust means everything is on fire
  5. Interested in a career in cybersecurity?

What is security?

The notion of security-first and security by design are critical to the work of developers, especially when you consider the ubiquity of security vulnerabilities across all kinds of software, verticals, and industries.

People security to the forefront with intent means that security is first of mind for all developers, UX designers, documentation writers and engineers – not just the security member of staff (and their team).  We take a look at some of the themes present in today’s security discourse.

You are the weakest link

According to Brian Vermeer, Developer Advocate at Synk, this also applies to the behaviour of team members – on and offline. He shares “It’s not that hard to find out where you work based on your email address. I mean normally, it’s first name dot last name at company name dot domain.”

He asked further “Who has confidential material on your laptop? I can follow you and get to know your routine. Who encrypts your hard drive? Who has access to your laptop? Who uses a password manager? 

Loading the player...

He further notes, that as developers – not just security staff – you probably have access to more secure materials than you realise:

“If you do DevOps, you probably have elevated privileges, for instance, to the database of your company. Who has credentials to enter the production server or the pipeline that can drop something into production? So can you imagine if we have that laptop of yours, and we abstract all that stuff from it, I can post on your git credentials, I can go to production, and I can even access the database“.

“Who of you has test data on their system locally? And it’s actually just a copy of the production data to test, for instance, reliability, speed and that kind of stuff? Do you have personally identifiable information on that? Is that anonymised? You are vulnerable. And the weakest link is not the system. It’s you. So why should I target the system? I just target you, it’s much easier.”

To make security effective, it’s not just about tick-a-box compliance. Rather, security must be backed into company values and delivered through company practices by all departments and individuals. 

Security hits in unexpected places like API attacks

Each time you publish an API, you punch a hole in your enterprise perimeter. Through API attacks, a lot of critical data which used to be well-protected in enterprises data centres is now exposed directly to the Internet.

Whenever you create APIs, you have to make sure that you have done everything you could to validate data flows, properly authenticate users, authorise access to the data, keep an audit trail among other security tasks. 

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

One of their members, Isabelle Mauny shared with Codemotion that OWASP recently added under-protected APIs to its Top 10 list of app vulnerabilities, a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

Loading the player...

It’s a recognition that API security is NOT web security. Rather APis have different attack vectors. They are data-centric, and there are lots of attacks coming from mishandling API data.

Each time you publish an API, you punch a hole in your enterprise perimeter. Through API attacks, a lot of critical data which used to be well-protected in enterprises data centres is now exposed directly to the Internet.

Whenever you create APIs, you have to make sure that you have done everything you could to validate data flows, properly authenticate users, authorise access to the data, keep an audit trail among other security tasks. 

Zero trust means everything is on fire

A lot of these data breaches are made possible due to missteps and misconfigurations. Many security issues are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behaviour by the end-users.

Security debt is a real problem for the vast majority of organisations in the world today, and the attackers will utilise this to their advantage.

Cisco defines Zero trust is a comprehensive approach to securing all access across your networks, applications, and environment. This approach helps secure access from users, end-user devices, APIs, IoT, microservices, containers, and more. It protects your workforce, workloads, and workplace.

According to David Lewis, Global Advisory CISO -Duo Security, “the easiest way to describe zero trust is that everything is on fire.”

Loading the player...

He contends: “We’re looking at going back to doing the fundamental things that we should have been doing right from the very beginning, network zone segmentation, user authentications, making sure that your asset inventories are up to date. If you are building out a new programme:

  • Do you know the libraries that you are including?
  • Do you know the libraries that you included in your own application?
  • Have you verified that these third party codebases are legitimate?

You have to go through and trust but verify and then verify again, everything as it comes along.”

Interested in a career in cybersecurity?

At Codemotion we’re big fans of resourcing people thinking about changing their career, such as moving into a role in cybersecurity. Dr Melanie Rieback is the CEO/Co-founder of Radically Open Security, the world’s first nonprofit computer security consultancy company.

She is also a former Assistant Professor of Computer Science at the Free University of Amsterdam (VU) who performed RFID security research (RFID Virus and RFID Guardian), that attracted worldwide press coverage, and won several awards.  

Loading the player...

Radically Open Security is the world’s first not-for-profit computer security consultancy company. They are prototyping an innovative new business model – using a Dutch “Fiscaal Fondswervende Instelling” (Fiscal Fundraising Institution) to provide a commercial front-end.

This sends 90% of their profits tax-free to a backend foundation (Stichting NLnet) that has supported open-source, Internet research, and digital rights organisations for almost 20 years.

The other 10% has been cashflow buffer, that allows the company to survive. Additionally, due to low management/overhead costs, they can afford to pay competitive wages to their computer security consultants.

If you want to know more about how modern technologies and tools can support you for – and during – the organisation of a virtual event, don’t miss this article showcasing the best tools we used to host our online conferences since the COVID-19 outbreak.

Related Posts

How to Augment App Security with Terraform: First Steps

Dipti Parmar
September 10, 2024
IoT crittografia, supply chain threats

Supply Chain Threats 101

gregoriopalama
April 29, 2024
XSS attacks

How to Prevent a Cross-Site Scripting Attack (XSS)

Jenna Bunnell
January 23, 2024
supply chain attacks, cybersecurity

What are Supply Chain Attacks and Why Should Developers Care?

Gilad David Maayan
January 15, 2024
Share on:facebooktwitterlinkedinreddit

Tagged as:DevSecOps Security

Cate Lawrence
The Importance of Leadership In Developer Teams
Previous Post
A CTO In the Making: What Skills Should You Have?
Next Post

Footer

Discover

  • Events
  • Community
  • Partners
  • Become a partner
  • Hackathons

Magazine

  • Tech articles

Talent

  • Discover talent
  • Jobs

Companies

  • Discover companies

For Business

  • Codemotion for companies

About

  • About us
  • Become a contributor
  • Work with us
  • Contact us

Follow Us

© Copyright Codemotion srl Via Marsala, 29/H, 00185 Roma P.IVA 12392791005 | Privacy policy | Terms and conditions