{"id":40365,"date":"2021-07-31T00:00:40","date_gmt":"2021-07-31T07:00:40","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/premier-developer\/?p=40365"},"modified":"2021-07-30T12:59:54","modified_gmt":"2021-07-30T19:59:54","slug":"workshop-spotlight-secure-devops-application-security-principles-and-practices","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/premier-developer\/workshop-spotlight-secure-devops-application-security-principles-and-practices\/","title":{"rendered":"Workshop Spotlight: Secure DevOps &#8211; Application Security Principles and Practices"},"content":{"rendered":"<p><a href=\"https:\/\/www.linkedin.com\/in\/reedrobison\/\">Reed Robison<\/a> spotlights the Secure DevOps: Application Security Principles and Practices Workshop.<\/p>\n<hr \/>\n<p>Developers juggle so many technologies that it\u2019s incredibly difficult to consider all the security ramifications of the code they build. Almost every customer I work with will say that security is a priority, and most have dedicated security teams that go to great lengths to validate secure infrastructure and architecture. That said, when it comes to applying secure practices in the development of code, very few invest to upskill developers. Security is a partnership of stakeholders, and if you ignore this with developers, it can be a costly oversight. In this post, I want to spotlight a workshop we offer that can help&#8211; Secure DevOps: Application Security Principles and Practices.<\/p>\n<p>Many of the posts on our blog are technical in nature, but from time to time I like to spotlight services and workshops under our Premier and Unified Support relationships that you may not be aware of. Beyond the incident support in these support agreements, there is a large catalog of workshops available to help teams build skills.<\/p>\n<p>This is a workshop available to Premier and Unified Support customers, so if you are not familiar with those programs, you can learn more <a href=\"https:\/\/www.microsoft.com\/en-us\/msservices\/unified-support-solutions\">here<\/a>. If you just want to drill into more info about some of the topics covered in the workshop, see the <em>Additional Resources<\/em> links at the bottom of this article.<\/p>\n<p>Let\u2019s look at the <strong>Secure DevOps: Application Security Principles and Practices Workshop.<\/strong><\/p>\n<p><em>From the syllabus:<\/em><\/p>\n<p>Secure DevOps: Application Security Principles and Practices is a two-day workshop that focuses on concepts, methodologies, and workflows that have been proven to yield more secure code. In this class, we discuss practices adopted at Microsoft (and other companies) that have facilitated improvements in application security. This workshop takes a hands-on approach to implementing secure design, secure verification, and secure implementation techniques to produce more secure software. Target audience are individuals in a technical role who are involved in building, architecting, testing, and designing secure software. People who manage software development teams and software development processes will also find much of the Security Development Lifecycle and Secure DevOps content helpful. This workshop also has a an optional 1-day add-on that discuss the OWASP Top 10.<\/p>\n<p><img decoding=\"async\" width=\"1286\" height=\"482\" class=\"wp-image-40366\" src=\"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2021\/07\/word-image.png\" srcset=\"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2021\/07\/word-image.png 1286w, https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2021\/07\/word-image-300x112.png 300w, https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2021\/07\/word-image-1024x384.png 1024w, https:\/\/devblogs.microsoft.com\/premier-developer\/wp-content\/uploads\/sites\/31\/2021\/07\/word-image-768x288.png 768w\" sizes=\"(max-width: 1286px) 100vw, 1286px\" \/><\/p>\n<p>The workshop covers 2-3 days in duration and drills into the following areas:<\/p>\n<p>Module 1: Evolution to Secure DevOps<\/p>\n<ul>\n<li>Threat Landscape<\/li>\n<li>Privacy and Compliance<\/li>\n<li>Microsoft\u2019s History with App Security<\/li>\n<li>Software Development Evolution<\/li>\n<li>Secure DevOps Culture and Mindset Shift<\/li>\n<\/ul>\n<p>Module 2: Secure DevOps Principles and Practices<\/p>\n<ul>\n<li>Secure DevOps Principles<\/li>\n<li>Secure DevOps Practices Assume Breach<\/li>\n<li>Practices Alignment<\/li>\n<li>Organizational Considerations<\/li>\n<li>Supporting SDL Practices<\/li>\n<\/ul>\n<p>Module 3: Application Security Principles<\/p>\n<ul>\n<li>Secure Application Basic Concepts<\/li>\n<li>Understanding Organizational Threats<\/li>\n<li>Secure by Design<\/li>\n<\/ul>\n<p>Module 4: Automating a Secure and Compliant Pipeline<\/p>\n<ul>\n<li>Automated Security Verification<\/li>\n<li>Managing Secrets<\/li>\n<li>Securing automated deployments<\/li>\n<\/ul>\n<p>Module 5: Threat Modeling Concepts<\/p>\n<ul>\n<li>What is Threat Modeling<\/li>\n<li>Threat Modeling Process<\/li>\n<li>Threat Modeling Tool<\/li>\n<\/ul>\n<p>Module 6: Policy and Standards<\/p>\n<ul>\n<li>Establishing Secure Standards<\/li>\n<li>Understanding Compliance<\/li>\n<li>Threat Modeling for Compliance<\/li>\n<\/ul>\n<p>Module 7: Introduction to Red and Blue Teams<\/p>\n<ul>\n<li>Defining Red\/Blue Team Activities<\/li>\n<li>Kill Chain Analysis<\/li>\n<li>Attack Decomposition<\/li>\n<li>Monitoring and risk management<\/li>\n<\/ul>\n<p>Module 8: Manual Security Verification<\/p>\n<ul>\n<li>Requirements and Design Verification<\/li>\n<li>Development Phase<\/li>\n<\/ul>\n<p>Module 9: Live Site Operations<\/p>\n<ul>\n<li>Continuous monitoring, alerting, logging<\/li>\n<li>Threat Detection<\/li>\n<\/ul>\n<p><strong>OWASP Top 10 <\/strong><\/p>\n<p>Overview of the OWASP Top 10 Each threat will be explained, and mitigation examples will be provided. The focus will be on .NET Core, and ASP.NET applications.<\/p>\n<ul>\n<li>A1:2017 \u2013 Injection<\/li>\n<li>A2:2017 &#8211; Broken Authentication<\/li>\n<li>A3:2017 &#8211; Sensitive Data Exposure<\/li>\n<li>A4:2017 &#8211; XML External Entities (XXE)<\/li>\n<li>A5:2017 &#8211; Broken Access Control<\/li>\n<li>A6:2017 &#8211; Security Misconfiguration<\/li>\n<li>A7:2017 -Cross-Site Scripting (XSS)<\/li>\n<li>A8:2017 &#8211; Insecure Deserialization<\/li>\n<li>A9:2017 &#8211; Using Components with Known Vulnerabilities<\/li>\n<li>A10:2017 &#8211; Insufficient Logging &amp; Monitoring<\/li>\n<\/ul>\n<hr \/>\n<p>Secure software requires design well beyond parameter and infrastructure security. It starts with getting developers on board with important concepts and considerations as the code is being written\u2014long before it\u2019s released.<\/p>\n<p>The Secure DevOps: Application Security Principles and Practices Workshop is an excellent way to establish core security knowledge into your application development lifecycle and ensure your developers are invested in delivering secure solutions.<\/p>\n<p>Premier and Unified Support customers should contact their Customer Success Account Manager (CSAM) for more information and help with workshop scheduling.<\/p>\n<p>Additional Resources<\/p>\n<ul>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/compass\">Microsoft Security Best Practices | Microsoft Docs<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/devsecops\">Microsoft Security DevOps<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/\">Microsoft Security Development Lifecycle<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/security\/secure-coding-guidelines\">Secure coding guidelines for .NET | Microsoft Docs<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/develop\/secure-dev-overview\">Secure development best practices on Microsoft Azure | Microsoft Docs<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure software requires design well beyond parameter and infrastructure security. It starts with getting developers on board with important concepts and considerations as the code is being written\u2014long before it\u2019s released.<\/p>\n","protected":false},"author":582,"featured_media":38586,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[129,96],"tags":[21,58,45],"class_list":["post-40365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-premier","category-security","tag-devops","tag-security","tag-training"],"acf":[],"blog_post_summary":"<p>Secure software requires design well beyond parameter and infrastructure security. It starts with getting developers on board with important concepts and considerations as the code is being written\u2014long before it\u2019s released.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/40365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/comments?post=40365"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/40365\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media\/38586"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media?parent=40365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/categories?post=40365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/tags?post=40365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}