SlideShare a Scribd company logo
1 of 21
Download to read offline
As An Attacker, I Want Your Data:
Anticipating Security Threats
Thu, Sep 3 at 8:05 AM PST / 11:05 AM EST
Ria Stein, VMware Spring Security Engineer
Kate Griggs, Zendesk Platform Product Manager
1
Personas: How They’re Often Used
Mary is a Director of Marketing at a large retail company.
She uses our app to review and update customer
segmentation strategies for all email campaigns.
“I want to excite the right customers with the right
products at the right time. It’s almost impossible to
deeply understand our wide customer base at-a-glance,
so I need to be able to analyze lots of data to run
successful campaigns.”
2
Mary, 38
Director of Marketing
Marketing Admin User Story
As Mary the Marketing Director
I want to access:
● our recent customers’ email addresses
● and their zip codes
So that I can decide to target them for the next location-
based email marketing campaign
3
Mary, 38
Director of Marketing
Marketing Admin User Story
As Mary the Marketing Director
I want to access:
● our recent customers’ email addresses
● and their zip codes
So that I can decide to target them for the next campaign
Acceptance Criteria (Gherkin format)
Given I log in as an admin
When I visit the Admin page
Then I see a list of customers with name, email address,
and zip code
4
Mary, 38
Director of Marketing
Let’s accept this story together.
But what about malicious intent?
6
But what about malicious intent?
7
Henri, 35
Hacker
Extraordinaire
But what about malicious intent?
Henri will do whatever it takes for the next big check.
He joined a global collective of hackers who steal PII
- customer personally-identifiable information -
to sell to untrustworthy sources.
He has dreams of running his own secret hacker operative,
and plans to eventually hack his own hacker group’s
datastore.
“The more customer data I can get my hands on, the
bigger the payout in the end. I’ll try just about anything -
and something always works.”
8
Henri, 35
Hacker
Extraordinaire
Marketing Admin User Story
As Mary the Marketing Director
I want to access:
● our recent customers’ email addresses
● and their zip codes
So that I can decide to target them for the next campaign
Acceptance Criteria
Given I log in as an admin
When I visit the Admin page
Then I see a list of customers with name, email address, and zip code
9
Mary, 38
Director of
Marketing
Henri shouldn’t be able to access
customer data then.
… Right?
AHHHHH! 😱
Let’s plan ahead to thwart Henri’s plans.
12
Henri, 35
Hacker
Extraordinaire
Let’s plan ahead to thwart Henri’s plans.
13
Henri, 35
Hacker
Extraordinaire
As Henri (the terrible attacker)
I want to steal customers’ PII (email addresses and zip codes)
So that I can sell the information to really bad people,
spamming them with irrelevant email ads for life!
(“muahahahaha!”)
Let’s plan ahead to thwart Henri’s plans.
14
Henri, 35
Hacker
Extraordinaire
As Henri (the terrible attacker)
I want to steal customers’ PII (email addresses and zip codes)
So that I can sell the information to really bad people,
spamming them with irrelevant email ads for life!
(“muahahahaha!”)
Rejection Criteria
Given I have figured out that /admin is the admin page
When I attempt to navigate to the customer data
Then I can see all the customer data
Intended experience: 403 error
How can we use Spring Security
to protect ourselves
against Privilege Escalation attempts?
Henri is thwarted, our customers are protected,
and Mary is able to do what she needs.
16
In summary:
● Create a test simulating Henri (a customer) directly accessing
the Admin homepage
● The test will fail because Henri is able to access the Admin
homepage
● Restrict the Admin homepage to administrators in the
security configuration
● Re-run the test
● The test will now pass because Henri is forbidden from
accessing the Admin homepage
17
Bake Attackers into your Agile Process
● Create an Attacker persona with your team:
Make sure to think about all types of malicious
intent someone could inflict upon your product
and its users
● Schedule an Attacker-focused sprint or iteration
focused solely on preventing attacks/protecting
your product
● Add Attacker Rejection Criteria to all of your
story templates so it doesn’t get missed
● Include Security outcomes in each feature plan
and make them part of your roadmap estimations
18
Bake Attackers into your Development Process
● Validate the security rules of your application, not
just the business logic
● Test your API with users that should have access
and users that should not
○ You can test with an existing user or a mock
user
● Spring Security includes test support for CSRF,
OAuth 2.0, JWT and more
19
Proactive Security Resources
Open Web Application Security Project® (OWASP) Foundation has lots
of resources for teams to use to get ahead of security concerns.
There’s a Top Ten list of Application Security Risks that your team can
prepare to protect against. There’s a Web Security Testing Guide to
help you with vulnerability assessment, penetration & runtime testing.
More information on Spring Security at spring.io/projects/spring-security.
All code used in this demo at github.com/eleftherias/s1-2020-attacker-story.
2
0
Talk to your product & security teams today about prioritizing attacker stories.
Want more on Spring Security?
Dial in for Ria’s next talk on
Spring Security Patterns
Thu, Sep 3 at 10:05 AM PDT
#springone@s1p
Attackers are out there.
Stay vigilant! Be proactive & thwart them
before it’s too late.

More Related Content

What's hot

The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpJames Wickett
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaMohammed A. Imran
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsJames Wickett
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secopsMohammed Ahmed
 
IntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitchIntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitchJasonRomero21
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019 Elizabeth Ayer
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azurekloia
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSAChris Downey
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOpJames Wickett
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsJames Wickett
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleJames Wickett
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOpsArchana Joshi
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceTej Luthra
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019James Wickett
 
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-NapocaFrom Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napocajerryhargrove
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramDenim Group
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS LaneJames Wickett
 
DevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security SuccessDevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security SuccessPuma Security, LLC
 

What's hot (20)

The Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOpThe Seven Habits of the Highly Effective DevSecOp
The Seven Habits of the Highly Effective DevSecOp
 
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP IndonesiaStrengthen and Scale Security Using DevSecOps - OWASP Indonesia
Strengthen and Scale Security Using DevSecOps - OWASP Indonesia
 
The New Security Playbook: DevSecOps
The New Security Playbook: DevSecOpsThe New Security Playbook: DevSecOps
The New Security Playbook: DevSecOps
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
IntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitchIntroSec Con - Building Your Blue Team Arsenal - glitch
IntroSec Con - Building Your Blue Team Arsenal - glitch
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in AzureSecure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
 
DevSecOps at the GSA
DevSecOps at the GSADevSecOps at the GSA
DevSecOps at the GSA
 
Release Your Inner DevSecOp
Release Your Inner DevSecOpRelease Your Inner DevSecOp
Release Your Inner DevSecOp
 
DevSecOps What Why and How
DevSecOps What Why and HowDevSecOps What Why and How
DevSecOps What Why and How
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and People
 
Benefits of DevSecOps
Benefits of DevSecOpsBenefits of DevSecOps
Benefits of DevSecOps
 
Demystifying DevSecOps
Demystifying DevSecOpsDemystifying DevSecOps
Demystifying DevSecOps
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
 
Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019Serverless Security: A How-to Guide @ SnowFROC 2019
Serverless Security: A How-to Guide @ SnowFROC 2019
 
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-NapocaFrom Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napoca
 
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA ProgramAppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
 
Security in the FaaS Lane
Security in the FaaS LaneSecurity in the FaaS Lane
Security in the FaaS Lane
 
DevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security SuccessDevSecOps: Key Controls for Modern Security Success
DevSecOps: Key Controls for Modern Security Success
 

Similar to As an Attacker, I Want Your Data: Anticipating Security Threats

THE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging Data
THE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging DataTHE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging Data
THE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging DataAlex Glenn
 
ArrowMiner FAQs
ArrowMiner FAQsArrowMiner FAQs
ArrowMiner FAQsdtsiolis
 
Why So Many Ads? An Introduction To Live Creative Optimisation
Why So Many Ads? An Introduction To Live Creative OptimisationWhy So Many Ads? An Introduction To Live Creative Optimisation
Why So Many Ads? An Introduction To Live Creative OptimisationAutomated Creative
 
Affordable Influencer Marketing For Brands of All Sizes | Heepsy
Affordable Influencer Marketing For Brands of All Sizes | HeepsyAffordable Influencer Marketing For Brands of All Sizes | Heepsy
Affordable Influencer Marketing For Brands of All Sizes | HeepsyKate Santoro
 
What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?ExpertsConsult
 
IBM Transforming Customer Relationships Through Predictive Analytics
IBM Transforming Customer Relationships Through Predictive AnalyticsIBM Transforming Customer Relationships Through Predictive Analytics
IBM Transforming Customer Relationships Through Predictive AnalyticsSFIMA
 
March Analytics Robot Madness
March Analytics Robot MadnessMarch Analytics Robot Madness
March Analytics Robot MadnessClient X Client
 
How to Effectively Build a Martech Stack & Integrate Your Marketing Tools
How to Effectively Build a Martech Stack & Integrate Your Marketing ToolsHow to Effectively Build a Martech Stack & Integrate Your Marketing Tools
How to Effectively Build a Martech Stack & Integrate Your Marketing ToolsPinpointe On-Demand
 
[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...
[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...
[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...Mintigo1
 
Leveraging big data to drive marketing innovation
Leveraging big data to drive marketing innovationLeveraging big data to drive marketing innovation
Leveraging big data to drive marketing innovationAndrew Leone
 
SMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis Ninjas
SMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis NinjasSMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis Ninjas
SMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis NinjasWijnand Meijer
 
Kritter introduction - agency - atd
Kritter   introduction - agency - atdKritter   introduction - agency - atd
Kritter introduction - agency - atdKrittercorporate
 
One size never fits all: Integrating your technology wisely
One size never fits all: Integrating your technology wiselyOne size never fits all: Integrating your technology wisely
One size never fits all: Integrating your technology wiselyAdestra
 
B2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generationB2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generationVanksen
 

Similar to As an Attacker, I Want Your Data: Anticipating Security Threats (20)

THE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging Data
THE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging DataTHE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging Data
THE NEW WORLD OF COLD OUTREACH - Automation, GDPR and Leveraging Data
 
ArrowMiner FAQs
ArrowMiner FAQsArrowMiner FAQs
ArrowMiner FAQs
 
Why So Many Ads? An Introduction To Live Creative Optimisation
Why So Many Ads? An Introduction To Live Creative OptimisationWhy So Many Ads? An Introduction To Live Creative Optimisation
Why So Many Ads? An Introduction To Live Creative Optimisation
 
Grin Software Deck
Grin Software Deck Grin Software Deck
Grin Software Deck
 
Affordable Influencer Marketing For Brands of All Sizes | Heepsy
Affordable Influencer Marketing For Brands of All Sizes | HeepsyAffordable Influencer Marketing For Brands of All Sizes | Heepsy
Affordable Influencer Marketing For Brands of All Sizes | Heepsy
 
What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?
 
IBM Transforming Customer Relationships Through Predictive Analytics
IBM Transforming Customer Relationships Through Predictive AnalyticsIBM Transforming Customer Relationships Through Predictive Analytics
IBM Transforming Customer Relationships Through Predictive Analytics
 
Analytics for Startups
Analytics for StartupsAnalytics for Startups
Analytics for Startups
 
March Analytics Robot Madness
March Analytics Robot MadnessMarch Analytics Robot Madness
March Analytics Robot Madness
 
How to Effectively Build a Martech Stack & Integrate Your Marketing Tools
How to Effectively Build a Martech Stack & Integrate Your Marketing ToolsHow to Effectively Build a Martech Stack & Integrate Your Marketing Tools
How to Effectively Build a Martech Stack & Integrate Your Marketing Tools
 
Lynchpin
LynchpinLynchpin
Lynchpin
 
[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...
[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...
[Webinar] How To Be A Data-Driven Marketing Powerhouse With Predictive Analyt...
 
Lynchpin
LynchpinLynchpin
Lynchpin
 
Unlock the Value of Usage Data
Unlock the Value of Usage DataUnlock the Value of Usage Data
Unlock the Value of Usage Data
 
Leveraging big data to drive marketing innovation
Leveraging big data to drive marketing innovationLeveraging big data to drive marketing innovation
Leveraging big data to drive marketing innovation
 
Growth Marketing
Growth MarketingGrowth Marketing
Growth Marketing
 
SMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis Ninjas
SMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis NinjasSMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis Ninjas
SMX London 2018 - Cheat Sheets to turn Reporting Squirrels into Analysis Ninjas
 
Kritter introduction - agency - atd
Kritter   introduction - agency - atdKritter   introduction - agency - atd
Kritter introduction - agency - atd
 
One size never fits all: Integrating your technology wisely
One size never fits all: Integrating your technology wiselyOne size never fits all: Integrating your technology wisely
One size never fits all: Integrating your technology wisely
 
B2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generationB2B & Growth Hacking: drawing from startups for online lead generation
B2B & Growth Hacking: drawing from startups for online lead generation
 

More from VMware Tanzu

What AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About ItWhat AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About ItVMware Tanzu
 
Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023VMware Tanzu
 
Enhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at ScaleEnhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at ScaleVMware Tanzu
 
Spring Update | July 2023
Spring Update | July 2023Spring Update | July 2023
Spring Update | July 2023VMware Tanzu
 
Platforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a ProductPlatforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a ProductVMware Tanzu
 
Building Cloud Ready Apps
Building Cloud Ready AppsBuilding Cloud Ready Apps
Building Cloud Ready AppsVMware Tanzu
 
Spring Boot 3 And Beyond
Spring Boot 3 And BeyondSpring Boot 3 And Beyond
Spring Boot 3 And BeyondVMware Tanzu
 
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdfSpring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdfVMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023VMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023VMware Tanzu
 
tanzu_developer_connect.pptx
tanzu_developer_connect.pptxtanzu_developer_connect.pptx
tanzu_developer_connect.pptxVMware Tanzu
 
Tanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchTanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchVMware Tanzu
 
Tanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishTanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishVMware Tanzu
 
Virtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVirtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVMware Tanzu
 
Tanzu Developer Connect - French
Tanzu Developer Connect - FrenchTanzu Developer Connect - French
Tanzu Developer Connect - FrenchVMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023VMware Tanzu
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootSpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootVMware Tanzu
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerVMware Tanzu
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeSpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeVMware Tanzu
 
SpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense SolutionsSpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense SolutionsVMware Tanzu
 

More from VMware Tanzu (20)

What AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About ItWhat AI Means For Your Product Strategy And What To Do About It
What AI Means For Your Product Strategy And What To Do About It
 
Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023Make the Right Thing the Obvious Thing at Cardinal Health 2023
Make the Right Thing the Obvious Thing at Cardinal Health 2023
 
Enhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at ScaleEnhancing DevEx and Simplifying Operations at Scale
Enhancing DevEx and Simplifying Operations at Scale
 
Spring Update | July 2023
Spring Update | July 2023Spring Update | July 2023
Spring Update | July 2023
 
Platforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a ProductPlatforms, Platform Engineering, & Platform as a Product
Platforms, Platform Engineering, & Platform as a Product
 
Building Cloud Ready Apps
Building Cloud Ready AppsBuilding Cloud Ready Apps
Building Cloud Ready Apps
 
Spring Boot 3 And Beyond
Spring Boot 3 And BeyondSpring Boot 3 And Beyond
Spring Boot 3 And Beyond
 
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdfSpring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
 
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
 
tanzu_developer_connect.pptx
tanzu_developer_connect.pptxtanzu_developer_connect.pptx
tanzu_developer_connect.pptx
 
Tanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - FrenchTanzu Virtual Developer Connect Workshop - French
Tanzu Virtual Developer Connect Workshop - French
 
Tanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - EnglishTanzu Developer Connect Workshop - English
Tanzu Developer Connect Workshop - English
 
Virtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - EnglishVirtual Developer Connect Workshop - English
Virtual Developer Connect Workshop - English
 
Tanzu Developer Connect - French
Tanzu Developer Connect - FrenchTanzu Developer Connect - French
Tanzu Developer Connect - French
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring BootSpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
 
SpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software EngineerSpringOne Tour: The Influential Software Engineer
SpringOne Tour: The Influential Software Engineer
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs PracticeSpringOne Tour: Domain-Driven Design: Theory vs Practice
SpringOne Tour: Domain-Driven Design: Theory vs Practice
 
SpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense SolutionsSpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
SpringOne Tour: Spring Recipes: A Collection of Common-Sense Solutions
 

Recently uploaded

Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 

Recently uploaded (20)

Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 

As an Attacker, I Want Your Data: Anticipating Security Threats

  • 1. As An Attacker, I Want Your Data: Anticipating Security Threats Thu, Sep 3 at 8:05 AM PST / 11:05 AM EST Ria Stein, VMware Spring Security Engineer Kate Griggs, Zendesk Platform Product Manager 1
  • 2. Personas: How They’re Often Used Mary is a Director of Marketing at a large retail company. She uses our app to review and update customer segmentation strategies for all email campaigns. “I want to excite the right customers with the right products at the right time. It’s almost impossible to deeply understand our wide customer base at-a-glance, so I need to be able to analyze lots of data to run successful campaigns.” 2 Mary, 38 Director of Marketing
  • 3. Marketing Admin User Story As Mary the Marketing Director I want to access: ● our recent customers’ email addresses ● and their zip codes So that I can decide to target them for the next location- based email marketing campaign 3 Mary, 38 Director of Marketing
  • 4. Marketing Admin User Story As Mary the Marketing Director I want to access: ● our recent customers’ email addresses ● and their zip codes So that I can decide to target them for the next campaign Acceptance Criteria (Gherkin format) Given I log in as an admin When I visit the Admin page Then I see a list of customers with name, email address, and zip code 4 Mary, 38 Director of Marketing
  • 5. Let’s accept this story together.
  • 6. But what about malicious intent? 6
  • 7. But what about malicious intent? 7 Henri, 35 Hacker Extraordinaire
  • 8. But what about malicious intent? Henri will do whatever it takes for the next big check. He joined a global collective of hackers who steal PII - customer personally-identifiable information - to sell to untrustworthy sources. He has dreams of running his own secret hacker operative, and plans to eventually hack his own hacker group’s datastore. “The more customer data I can get my hands on, the bigger the payout in the end. I’ll try just about anything - and something always works.” 8 Henri, 35 Hacker Extraordinaire
  • 9. Marketing Admin User Story As Mary the Marketing Director I want to access: ● our recent customers’ email addresses ● and their zip codes So that I can decide to target them for the next campaign Acceptance Criteria Given I log in as an admin When I visit the Admin page Then I see a list of customers with name, email address, and zip code 9 Mary, 38 Director of Marketing
  • 10. Henri shouldn’t be able to access customer data then. … Right?
  • 12. Let’s plan ahead to thwart Henri’s plans. 12 Henri, 35 Hacker Extraordinaire
  • 13. Let’s plan ahead to thwart Henri’s plans. 13 Henri, 35 Hacker Extraordinaire As Henri (the terrible attacker) I want to steal customers’ PII (email addresses and zip codes) So that I can sell the information to really bad people, spamming them with irrelevant email ads for life! (“muahahahaha!”)
  • 14. Let’s plan ahead to thwart Henri’s plans. 14 Henri, 35 Hacker Extraordinaire As Henri (the terrible attacker) I want to steal customers’ PII (email addresses and zip codes) So that I can sell the information to really bad people, spamming them with irrelevant email ads for life! (“muahahahaha!”) Rejection Criteria Given I have figured out that /admin is the admin page When I attempt to navigate to the customer data Then I can see all the customer data Intended experience: 403 error
  • 15. How can we use Spring Security to protect ourselves against Privilege Escalation attempts?
  • 16. Henri is thwarted, our customers are protected, and Mary is able to do what she needs. 16
  • 17. In summary: ● Create a test simulating Henri (a customer) directly accessing the Admin homepage ● The test will fail because Henri is able to access the Admin homepage ● Restrict the Admin homepage to administrators in the security configuration ● Re-run the test ● The test will now pass because Henri is forbidden from accessing the Admin homepage 17
  • 18. Bake Attackers into your Agile Process ● Create an Attacker persona with your team: Make sure to think about all types of malicious intent someone could inflict upon your product and its users ● Schedule an Attacker-focused sprint or iteration focused solely on preventing attacks/protecting your product ● Add Attacker Rejection Criteria to all of your story templates so it doesn’t get missed ● Include Security outcomes in each feature plan and make them part of your roadmap estimations 18
  • 19. Bake Attackers into your Development Process ● Validate the security rules of your application, not just the business logic ● Test your API with users that should have access and users that should not ○ You can test with an existing user or a mock user ● Spring Security includes test support for CSRF, OAuth 2.0, JWT and more 19
  • 20. Proactive Security Resources Open Web Application Security Project® (OWASP) Foundation has lots of resources for teams to use to get ahead of security concerns. There’s a Top Ten list of Application Security Risks that your team can prepare to protect against. There’s a Web Security Testing Guide to help you with vulnerability assessment, penetration & runtime testing. More information on Spring Security at spring.io/projects/spring-security. All code used in this demo at github.com/eleftherias/s1-2020-attacker-story. 2 0
  • 21. Talk to your product & security teams today about prioritizing attacker stories. Want more on Spring Security? Dial in for Ria’s next talk on Spring Security Patterns Thu, Sep 3 at 10:05 AM PDT #springone@s1p Attackers are out there. Stay vigilant! Be proactive & thwart them before it’s too late.