SecAppDev 2023 workshop details
How to scale software quality and security using the open source tool Semgrep
Learning goal: Why the current approach to software security is not working. How to automate code review to free up your time for higher impact work. Best practices in rolling out continuous code scanning, and how to write custom Semgrep rules.
Friday June 16th, 09:00 - 17:30
Room Lemaire
Abstract
The software security industry is shifting left. Traditional security tools have failed to address the challenges of modern engineering teams as they often are too slow, overwhelm users with false positives, and do not provide sufficient remediation help. As a result, they do not ultimately raise a company’s security bar.
In this workshop we will focus on hands-on exercises, supported by research results to teach participants how to use Semgrep by taking a different approach to security, called paved road or secure defaults.
Content overview
- Why code scanning is useful
- Intro to Semgrep
- Rule writing (Hands on)
- Code scanning best practices
- Adding Semgrep to CI (Hands on)
- Semgrep CLI (Hands on)
- Advanced Semgrep features
- Taint mode (Hands on)
- Secure Defaults
- Guardrail rules (Hands on)
- Remediation guidance research
- Autofix rules (Hands on)
- Bring your own code (Hands on)
- Q&A
Content level
Deep-dive
Target audience
Any web application security professional or developer interested in secure coding
Prerequisites
Nothing is required besides basic programming skills.
Technical requirements
Laptop with internet connection. Installing Semgrep or trying out Semgrep’s online playground can be useful but is not required.
Pieter De Cremer
Senior security researcher, Semgrep
Expertise: Application security, secure defaults, developer-focused security tools
Claudio Merloni
Security research manager, Semgrep
Expertise: Application security, secure development and static source code analysis
Other workshops
Secure Coding with the OWASP Top Ten
One-day workshop by Jim Manico in room West Wing
Friday June 16th, 09:00 - 17:30
The OWASP Top 10 is a standard awareness document for web developers and web application security professionals. It represents a broad consensus about the most critical security risks to web applications. As software developers author code that makes up a web application, they need to embrace and practice various secure coding techniques. This training provides defensive instruction in relation to the OWASP Top Ten to aid developers in authoring secure software.
Learning goal: A thorough understanding of the risks listed in the OWASP top 10, along with best practice secure coding guidelines to mitigate these risks in web applications and APIs
Designing and building secure user authentication mechanisms
One-day workshop by Philippe De Ryck in room West Wing
Thursday June 15th, 09:00 - 17:30
User authentication is a critical component in almost every application. In this workshop, we explore user authentication and investigate which mechanisms are available in modern applications, along with their security properties, pros, and cons. You will learn about state-of-the-art passwordless authentication mechanisms, including the Web Authentication API and the newly-introduced PassKey mechanism. Additionally, we explore multi-factor authentication mechanisms and their security properties.
This workshop consists of a mix between lectures, demos, interactive quizzes, and hands-on labs.
Learning goal: In-depth understanding of the security properties provided by modern authentication mechanisms, along with the technical knowledge to implement these mechanisms in modern web applications.
Building secure systems with threat modeling
One-day workshop by Avi Douglen in room Lemaire
Thursday June 15th, 09:00 - 17:30
Threat Modeling is a structured methodology to efficiently analyze complex systems. This can help you identify weaknesses and prioritize appropriate countermeasures. But to maximize its effect, this must be an ongoing practice, not just a one-time activity, so we also introduce a more lightweight "value driven" approach for security-minded developers.
The threat modeling techniques taught in this workshop will guide you in contributing to your product's security, focusing on security features, and designing a secure product architecture.
Learning goal: How to design a secure product with threat modeling. Share useful models to evoke insight and communicate with others. Inspire and convince others to collaborate on threat modeling in a continuous workflow.