I’ve been a fan of The Great Suspender extension for years. Even when Google would drop new features into its Chrome browser to reduce the resources inactivate browser tabs eat up, I still trusted The Great Suspender to “inactivate” them for me to lessen the load on my system. But The Great Suspender has recently proven untrustworthy, and it’s probably time to say goodbye.
Has anyone had any trouble managing noise in appsec scanners (think Snyk, OWASP ZAP, Bridgecrew, TFSec, Claire, and all the other SAST/DAST/SCA tools) in a modern DevOps environment? E.g. too many alerts, too hard to prioritize alerts, irrelevant alerts to the business, too hard to properly define policies for what scanners run where and when, etc? I’ve gotten the sense that a lot of cloud sec teams feel stuck figuring out how to get developers to actually fix appsec issues, and engineers/DevOps will often ignore the scan results sent over JIRA or in pull requests because there are too many. How do people solve this?
We’re working towards eliminating high severity but it’s going to take work. Most seem largely irrelevant though which makes it feel like box ticking. Some don’t account for mitigations elsewhere. Upstream images have plenty of trivy findings, especially anything Debian based (ubuntu clean). Feel like try tighten down what can and schedule routine review of what accepting is only reasonable way. Ie ratchet.. Compared with implementing and stopping the world.. depends on ones risks?
I haven’t been through soc2 etc before though.
Interesting so sounds like you mostly have to just extensively manually triage this stuff in order to find the stuff that is actually relevant?
It seems to me like there is an opportunity for better tooling here to improve actionability of findings based on various signals
Malwarebytes becomes fourth major security firm targeted by attackers after Microsoft, FireEye, and CrowdStrike.
can anyone recommend some good documentation on configuring terraform compliance?
we would like to run it against CI for our terraform modules monorepo as well as when we execute this modules from other repos as part of Atlantis
we’ve started using using bridgecrew. makers of checkov.
other tools frequently mentioned:
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew. - bridgecrew…
Built to be simple- Protecting infrastructure in the public cloud is a software engineering challenge. We solve it like one.