9 Great DevSecOps Tools for Dev Teams to Integrate Throughout the DevOps Pipeline

June 12, 2018 Ayala Goldstein
Best DevSecOps Tools

If you’ve been reading any AppSec blogs or news over the past few years, you probably noticed that there’s a lot of talk about DevSecOps, the popular new kid on the Agile AppSec block. Embedding security into the DevOps cycle has become an increasingly popular approach, and many organizations are still trying to figure out how to ensure that security is shifted left and integrated throughout the DevOps cycle. 

Adopting a DevSecOps approach requires a change of attitude across the organization, and it applies to processes, people, and the tools that they use.

While this kind of organizational change is always a challenge, more and more enterprises and organizations are making a concerted effort to shift security practices left and incorporate them into the DevOps cycle, ensuring that implementing essential security checks don’t impede time to market. According to recent DigiCert research, nearly half of the organizations surveyed said that they are in the process of integrating security with DevOps, while the rest said that they already completed their integration.

Automation is in the Heart of DevSecOps Approach

One of the main components of the DevSecOps approach is automation: as early and often as possible, throughout the SDLC, ensuring security is woven into the entire development life cycle, saving time and money while reducing friction between security and development teams.

We’ve put together a list of some of the top DevSecOps tools that organizations can integrate into their DevOps pipeline, to ensure that security is handled continuously throughout the development lifecycle.

 

#1 Continuum Security

continuum security logo

This cybersecurity company offers enterprise organizations an Application Security Requirements and Threat Management Solution with their threat modeling platform IriusRisk. This platform allows them to automate and scale their secure design activity by helping developers and security analysts  deal with software vulnerabilities as early as the application design stage.

Adding this type of automated DevSecOps solution at the start of  the development life cycle enables teams to address security risks early in the development process when they’re easiest and cheapest to fix.

Continuum also offers a BDD-Security framework, an open source dynamic testing tool for businesses to integrate security testing into their development pipelines. The framework is compatible with most of the popular issue trackers, SAST, DAST, unit testing frameworks, and offers an open API for anything it doesn’t support natively. This allows teams to automatically synchronise their tests with issue trackers in the context of the threat model. The IriusRisk API can also be integrated into organizations’ Continuous Delivery pipeline so that code which doesn’t meet the risk profile is not deployed to production.

 

#2 ThreatModeler:

ThreatModeler logo

ThreatModeler is another automated threat modeling platform that offers a web-based, platform-independent solution. Once users provide functional information about their applications or systems, ThreatModeler automatically analyzes the information. The relevant potential threats are identified, based on accurate threat intelligence. ThreatModeler promises to provide the actionable outputs users need for software development or network security, ranked by risk. ThreatModeler also provides the mitigating security requirements and test cases to ensure security implementation.

 

#3 Evident.io

Evident.io logo

A cloud security solution for the deployment stage, Evident Monitoring & Compliance enables organizations to proactively assess and manage cloud security risk — across all AWS and Azure services, and provide an easy to read, aggregated view into all accounts and regions.  The Evident Security Platform (ESP) continuously monitors users’ AWS cloud, automatically identifies security misconfigurations, and enables rapid mitigation of risk through guided remediation.

 

#4 Checkmarx

Checkmarx logo

This SAST (Static Application Security Testing) Tool analyzes an application’s code for flaws which are indicative of security vulnerabilities. Checkmarx’ SAST tool allows developers to automatically scan uncompiled/unbuilt code and identify security vulnerabilities in over 20 languages, providing quick feedback on code security state, and actionable remediation advice. The tool integrates with all IDEs, build management servers, bug tracking tools, and source repositories.

 

#5 Contrast Security

contrast security logo

This crew offers a Runtime Application Self-Protection (RASP) and an Interactive Application Security Testing (IAST) solution.

Contrast Security’s solutions integrate into users’ apps and work continuously in the background. The first part of the Contrast Security Suite, named Contrast Assess, alerts developers when a vulnerability is discovered. The second part of the suite, called Contrast Protect, uses the same embedded agent, and works in the production environment, looking for exploits and unknown threats, and reporting what it finds to a SIEM console, next generation firewall, or any other security tools an organization already has in place.

 

#6 IMMUNIO

Immunio logo

This company also offers a patented cloud-based Runtime Application Self-protection (RASP) solution. It promises to protect online applications and website visitors from application layer attacks and is compatible with popular frameworks like Scala, PHP, Python, Ruby, Node.JS, and Java.

The IMMUNIO solution includes real-time security analytics, including information about attackers, and the code vulnerabilities they attempt to exploit. In addition, IMMUNIO protects against session farming, credential stuffing, and scanning tool detection.

 

#7 Aqua Security

AquaSec logo

This product provides container security throughout the DevSecOps pipeline. Aqua’s cloud-native security platform provides users with full control over containerized environments, with tight runtime security controls and intrusion prevention capabilities, at scale.

The platform supplies users with an API for easy integration and automation. The Aqua Container Security Platform provides complete SDLC controls for securing containerized applications that run on-premises or in the cloud, as well as on Windows or Linux. The platform supports a variety orchestration environments.

 

#8  Dome9 Security

Dome9 logo

This is an agentless SaaS-based solution aimed at providing security and compliance across all public and hybrid cloud environments. The Dome9 platform offers functionality across three key security areas: Network Security, IAM Protection and Compliance and Governance.

Dome9 offers users full visibility and control of security and compliance in AWS, Azure, and Google Cloud environments.

 

#9 WhiteSource

WhiteSource logo

Another type of risk that the rest of the DevSecOps tools in the list don’t address is open source vulnerabilities. Considering today’s typical application will include 60%-80% open source code,  it’s very important that organizations don’t neglect open source security management, and deploy a dedicated solution that will track and alert users about open source risks throughout the DevSecOps pipeline.

WhiteSource integrates into the SDLC, and is compatible with over 200 programming languages, as well as a wide variety of build tools and development environments. It runs automatically and continuously in the background, tracking the security, licensing, and quality of open source components and matching them against WhiteSource’s comprehensive database of open source repositories.

Which DevSecOps Tools are Right for You?

Adopting the DevSecOps approach throughout an organization is no simple feat. Remember, Rome wasn’t built in a day and organizational changes don’t happen overnight.

Choosing the right automated DevSecOps tools is a great way to start. Think about your organization’s systems and networks, processes and teams, and start out with the tools that will help you most and are an easy fit.

Using the right automated tools that help to secure your product throughout the SDLC allows your development teams to power through to meet release schedules with high-value deliverables, without the need for security to send them back to the drawing board as they near the finish line.

 

Previous Article
Top 5 Linux Kernel Vulnerabilities in 2018
Top 5 Linux Kernel Vulnerabilities in 2018

Next Article
Top 5 New Open Source Security Vulnerabilities in May 2018
Top 5 New Open Source Security Vulnerabilities in May 2018