Devertix
Team
2023.11.14
The traditional approach to application security (AppSec) was not that complicated. However, over the years the software development process has changed dramatically. It has become faster, and more dynamic and now relies on third-party frameworks. In particular, it now contains a three-tier framework for CI/CD security. đ
1. Security in the pipeline (SIP)
SIP can be considered a traditional AppSec problem. It ensures that developers do not introduce any kind of uncertainty into deployment. Thus, code entering the CI/CD pipeline should be reviewed to ensure that it does not contain any security risk bugs or misconfigurations. Of course, while this doesn't sound that complicated, it is compounded by the fact that teams now work with more technologies and frameworks than ever before, each requiring unique security-testing skills.
2. Security of the pipeline (SOP)
This means the security of the software delivery chain itself. Pipelines can be attacked through attempts to run harmful code within the channel or by stealing credentials from CI/CD devices to cause damage to the system. Vulnerable dependencies, access management gaps and inappropriate credentials all create opportunities to disrupt CI/CD processes. Therefore, SOP focuses on the security posture of the actual systems and devices that compromise the software supply chain.
3. Security around the pipeline (SAP)
If both SIP and SOP are secure, what happens if hackers can bypass the pipeline completely? This would invalidate even perfectly carried out verification processes. SAP is needed to prevent hackers from inserting code directly into the system. Overall, it is important to ensure that anything that can access the live system can only approach it via the pipeline.
By following these 3 easy safety steps, you can be sure your pipeline is safe.