Conf42 DevSecOps 2025 - Online

- premiere 5PM GMT

DevSecOps Supply Chain Defense: Proactive Strategies Against Modern Cyber Threats

Video size:

Abstract

Transform your DevSecOps pipeline security with proven strategies that reduce supply chain attacks by 57%. Learn actionable frameworks from real-world incidents to build resilient, proactive defense systems that protect your entire software delivery lifecycle.

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hello everyone. I'm GR Malu. I'm a cybersecurity risk consultant at Chevron. Over 11 years I spent across in working with investment banking, oil and gas, energy and consulting. Majorly focusing on CICD pipelines, DevSecOps, third party risk management, and AI security. Across the industries I have seen, one thing in common is it's not just your code gets you into trouble. It's about the dependencies, the CICD pipelines and the third parties wrapped around it. Today I talk about software, supply chain attacks and attacks. Just don't hit your application directly, but instead target the tools, dependencies, and the pipelines. You re, you rely on. These attacks have go grown by 700%, which is a significant amount in recent years, and now one of the biggest risk to the modern organizations. My goal in this session is to share practical, real world strategies you can apply to your own DevSecOps pipeline so that they become proactive and resilient. Let's move on to the next slide where we talk about critical threat landscape and supply chain attacks, and why supply chain attacks are so dangerous. A modern application is no longer just your code. It's built from open source library, third party software development kits and cloud services, and CAC retooling. Attackers have learned that it's they, if they compromise a trusted software, a delivery channel, for example, a built pipeline, a popular open source package, or an update mechanism that they can impact hundreds or thousands of organizations at once. Most enterprise applications today depend on hundreds of open source sub components, and many of those are transitive dependencies, and the teams don't even realize that they are using them. The lack, that lack of visibility creates perfect hiding places for the attack vectors. We have also shifted from monoliths to microservices and from OnPrem to hybrid or multi-cloud, and from manual releases to high velocity CI I CT pipelines. The great shift. That's a great shift of innovation. But that also means like attackers now have dozens of places to slip in. For example, package ies, build systems, pipeline plugins, and vendor APIs. Oas reflect the shift clearly and in OVAs top 10 for web. You see the items like vulnerable and outdated components and software and data integrity failure. In the O-S-C-I-C-D top 10, risks like dependency chain abuse, poisoned pipeline execution, and inadequate identity access management. That's literally a description of the modern supply chain problem. We know from data that organizations who implemented formal third party risk management programs and strong DevSecOps practices have significantly fewer incidents. So the message is clear. This is no longer a, just a checkbox or an edge case. Supply chain now has become a critical to application security and let's move on to those slide three. Aware we'll learn about will modern divesting real world examples and what their impact are. Let's first talk about SolarWinds, which is a classic example of build system compromise. Nations tech attackers infiltrated the vendors built up environment and injected malicious code into the trusted software update. That single update went out around 18,000 customers, including government organizations and large enterprises. The attack then started the customer. It started at the upstream in the pipeline. Let's talk about Log four J. We saw how one widely used open source logging library could become a global emergency. Most organizations didn't even know where Log four J was running because it was buried deep inside. Other components. This is the risk of vulnerable and outdated components, which are exactly OSP has mentioned in mid Stockton. In 2024, the CrowdStrike Falcon Update Falcon content update caused a massive outage when faulty security update crashed millions of windows systems worldwide. This wasn't a malicious attack, but from resilient perspective, it behaved like a supply chain failure. One update pipeline, global Impact. And with platforms like Snowflake, we have seen how attackers can abuse stolen credentials, or we can access controls in third party cloud data service to access many different organizational data. The common pattern is simple. The adversary writes on something we are already trust and update an agent, a library, or a vendor platform. Let's move on to next slide here. Let in response to these incidents, I have worked on defense framework that combines lessons learned and research industry standards and real implications across sectors like energy and banking. At high level, the framework has several pillars, and if you see shit left in DevSecOps, it brings security into planning, coding, and build stages. That means all the stages of software development Lifecycle L, and secure the CACD pipelines, lockdown identities, secrets and infrastructure for your build and deploy systems. Advanced detection use behavioral analytics to spot unusual activity and runtime application self protection to detect and block attacks from inside the application. Vendor risk management, continuously evaluate, monitor, and third party tools and the platforms. Zero. Trust architecture, never trust, always verify for every component, even internal ones in production environments. When we have applied this framework, we have seen faster detection of vulnerability, dependencies, and of measurable detection in tampering incidents and better containment during the potential compromises. I'll walk you through each of these pillars in the next upcoming chapters. Let's move on to the next slide with the. In this chapter one, I'll focus on how supply chain attacks have evolved and what it looks like today in our software development ecosystem, we have more from mostly proprietary monolithic application to highly con componentized systems that depend on open source managed services and cloud native coding. That shift has increased. Speed in innovation, but it has also multiplied trust relationships. Let's see some modern threat vectors. Let's first talk about dependency confusion. You think you are pulling, if you think you are pulling the company internal logging from your private registry, but your ci misprioritized the public registry and an attacker uploads the package with the same name. The build passes the test, even pass, and you have just to ship the attacker control score. And let's talk about hypo squatting. Hypo squatting. Attackers publish packages with the file names, with the small changes, or just deferred by one character. So that means like late night, the dev, the tire developer mistypes a name installs the wrong one. And the malicious payload isn't, it's simple, but still works and. Let's talk about the CICD compromise. What's worse than a compromised repo? A clean repo with a compromised build runner. The source looks perfect. The malicious payload gets in injector only at build or packaged package packaging time. The key idea in is that modern supply chain attacks are not random. The, they systematically exploit the way we develop and ship software. Understanding these patterns is the first step to defending against them. Let's move on to the next slide. Let's talk about why traditional security fails in this slide. Traditional security models struggle with the these attacks for a few re reasons. First, like first, older models are based upon stronger perimeter. We assume inside the network is trusted and outside is untrusted. Distributed pipelines, cloud services, and remote teams, that assumption breaks down completely. Second, many security processes are still focused on static checks at the end of the lifecycle. A final penetration test, a yearly audit, or occasional. Manual reviews, supply chain attacks, especially those targeting on CACD often happens in the middle of pipeline during the bills, packaging, or updates where checks don't see them. The third, when we fully trust code because it is slight signed or delivered by a well-known vendor, we forgot that signing only proves origin, not safety. If the bill system or maintainer is compromised, the signed artifact can still be malicious. This is why we need to change our mindset from inside is safe to continuous verification and defense in depth across the enterprise pipeline. Let's move on the next slide. In this, let's talk about the cascade. This is one of the most aspects of supply chain attacks is. Supply chain effect attacks these days. Imagine a single popular open source component. That component is used in dungeons of libraries, which then get used into hundreds of applications when vulnerability or back door appears in that one of the component, the impact cascades through entire system ecosystem. We saw this with a log four j. A single component far down in the dependency tree created crisis for many organizations that didn't even know that they were using, that the same Cascade Direct applies to ci, cd platforms and security tools. If a widely used build agent or endpoint agent, which out bad update like in the CrowdStrike incident, the consequences are global. Very huge. This is why we must treat software supply chains as a complex interconnector systems and not just individual applications. Let's move on to next slide where this is a chapter two, we talk about resilience, DevSecOps. In this chapter, let's talk about how to build resilience in your devs practices so that you can handle this cascade risk. The goal is not to slow the teams, but to secure, but to bake security into daily workflows, from planning, to coding, to testing, releasing and operating. We'll look at practical ideas like shifting security left into design and coding. Integrate security checks into integrate integrated development environments and pre-committed hooks. Continuously scanning dependencies and generating software, bills of materials and software builds of materials is a structured list of all components inside your software. I in. These are found foundations that make later more advanced control effective. Let's move on to next slide. Let's talk now. Let's talk specifically about securing the CICD pipeline because this is a heart of your software factory As a reminder, c. It's a, as it is continuous integration and continuous delivery or deployment. It's the automated systems that spool score runs, test to build artifacts and ships from them to production. If an attacker controls your CICD pipeline, they essentially control what you. The key controls include a majorly identity access management, ensuring that build agents, service accounts, and human users will all have least privilege only the permissions they absolutely needed based upon their role and secret management. Using the secure walls instead of hard coding credentials and configuration or code. Secret Ma. Isolated runners treating build agents as ephemeral shortlived mechanism that are destroyed after each job, reducing the chance of persistent compromise. Network segmentation. Make sure CICD components cannot freely. Every internal system, especially production databases, it's also crucial to manage third party plugins and actions used by CICD tools, each plugin in efficient, effectively code that runs in your pipeline so that there should be a review and approval process for what you allow. These measures align directly with ova top 10, CACD risks such as inadequate identity access management, dependency chain abuse, and poisoned pipeline executions. Let's move on to next slide where we talk the chapter three. Where we talk about advanced threat detection, even with the strong preventive controls, we have to ensure that something. Someday we'll slip through. Here we move beyond basic signature based detection into techniques that understand behavior and context. For example, monitoring CCD, unusual behaviors like a pipeline suddenly pulling a large number of new dependencies from unfamiliar sources. Watching for abnormal network connections from build agents or application containers. This is where security information and event management, CM tools and user and entity be behavior analytics can play an important role correlating events and highlighting anomalies that deserve investigations. The idea is to quickly answer the question, is the behavior normal for this system? If not, we have, we want to detect and respond before it turns into full down incident. Let's move on to next section slide. In this slide we talk about runtime application, self-protection, a key component of advanced detection in the ecosystem. Runtime application, self-protection technology that runs inside your application monitors its behavior in real time. Unlike a traditional web application firewall that send sits in your application. And this runtime application, self protection can see how inputs are being processed internally and can block malicious actions even if it play even if the play load has already reached the application. For example, if you have compromised dependency, tries to execute a suspicious command or attempts unexpected file or network accesses. REAP can detect that pattern and stop the request or terminate the session. So that would really help when I combine, when combined with these techniques like us. SaaS static application security testing, and the dynamic application security testing test earlier in the lifecycle. RASP provides laced last line of defense in the production line. In practice, we have seen that organizations use using R-E-C-A-R-E-S-P, especially for their most critical external facing services. Have much better chances of preventing vulnerability from turning into a breach, even when a supply chain flaw surfaces after deployment. Let's move on to next slide with the chapter four vendor risk management, which is very important. The, this will focus on how to manage vendor or third party risk management, which is absolutely center to the key to the supply chain security. Most of the organizations rely heavily on software as service, SaaS platform as service pass and infrastructure. As service as IAS provides providers as well as we specialize security and analytics tools. Each of these vendors become an extensive for your attack surface. Strong third party risk management programs looks at security certifications like usually reviewing the SOC two type two reports IS four 27,001 deficiency reports or PCI DSS where it is based upon the relevancy of the industry. The vendor own CICD and supply chain practices, do they use S-P-O-M-S Code Signing and Strong? I do. They have strong I identity and access management practices and there how their incident response system looks like process looks like. How quickly do they notify customers when something goes wrong? And ongoing continuous monitoring, not just a questionnaire at onboarding. It's like how they are doing the continuous monitoring and how we are monitoring our third parties continuously. Incidents like this, like snowflake breaches, highlight that it's not enough for a platform to be powerful. It must also be operated securely by both the vendor and the customers and vendor risk is shared responsibility and our. Detentions must reflect that. Let's move on to next slide, the chapter five zero trust Architecture. Finally, in this chapter, we we talk about zero trust architecture, which is never trust, always verify. Instead of assuming that anything inside our network is safe zero trust, assume that threats can exist both sides inside and outside as well. Organization In a zero trust model for supply chain and DevSecOps, we require strong authentication and authorization everywhere, often using multifactor authentications. Role-based access controls, treat every component, repositories, build agents services as needing to prevent its identity and registry. Cut. Continuously, not just once. Use code signing hardware, security modules, and sometimes trusted platform modules to anchor trust in hardware where possible apply microsegmentation so even one part of the environment is compromised. Lateral movement is limited. Zero Trust is not a just a product, it's a design philosophy. Applied if this is applied correctly, it significantly reduced the impact of compromised dependency tool or supplier because nothing nothing and no one is implicitly trusted. Let's move on to the next slide. To make this all actionable, I like to think terms of paced roadmap, foundation enhancement and optimization foundation in this foundation phase. And coming next three to six months, you can enable automated dependency scanning systems and start generating. O software builds and of materials for key applications. Begin code assigning for critical artifacts. Establish basic vendor assessment and T-P-C-R-M process. Enforce multifactor authentication and list platforms and critical SaaS tools. Enhancement phase in coming next six to 12 months. Deploy RASP runtime application self protection. For your most critical external facing applications, implement behavioral monitoring for CICD pipelines and production workloads. Integrate automated security tests, testing like SaaS and DA scans and container scanning throughout your pipelines Rollout. Continuous vendor monitoring instead of one-time reviews optimi at the optimization phase. It's cons. It should be considered as ongoing. Tune detection rules to reduce noise and focus on high risk anomalies. Optimize governance, so security control support, not block development velocity. Implement advanced capabilities like software at the station and a province tracking, for example, inspired by frameworks like supply chain levels of for software artifacts. This idea is to build progressively rather than trying to do everything at once. Let's move on to next slide. Let's wrap up the content. I want to written to key mindset shift, moving from reactive security to proactive defense. Reactive security waits for an incident breach, an outa outage, or a critical vulnerability, and then scrambles to respond. Proactive supply chain defense assumes that vulnerabilities and attacks are inva and designs resilience into the entire lifecycle. That means treating your DevSecOps pipeline itself as a primary asset to secure investing in visibility so you know what components you run and how they behave. Building layers of defense from design and development to build deployment and runtime monitoring. Organizations that embrace this approach are able to maintain development speed while drastic, drastically reducing the risk. You don't have to choose between agility and security. You just have to design both intentionally. And I would like to thank you so much for your time and attention. I would like to continue the conversation about DevSecOps and CICD pipeline security and our supply chain risk. Risk. So feel free to catch me upon LinkedIn. I'm always happy to exchange the ideas and real world experiences. I hope this talk gives you a clear starting point to strengthen your own pipelines and supply chain supply chains. Thank you so much.
...

Gresshma Atluri

Cybersecurity Risk Analyst @ Chevron

Gresshma Atluri's LinkedIn account



Join the community!

Learn for free, join the best tech learning community

Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Access to all content