testing tools Archives - DevOps Online North America https://devopsnews.online/tag/testing-tools/ by 31 Media Ltd. Tue, 18 Sep 2018 16:21:04 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.2 Going from DevOps to DevSecOps https://devopsnews.online/going-from-devops-to-devsecops/ Tue, 18 Sep 2018 16:07:18 +0000 http://www.devopsonline.co.uk/?p=14033 As a provider of test leadership for agile and DevOps, an innovator and a believer in change, Wayne Tofteroo believes there are always ways we can improve

The post Going from DevOps to DevSecOps appeared first on DevOps Online North America.

]]>
DevOps is the union between the development tribe and the operations tribe to create an efficient smooth delivery of services. It has revolutionised our approach to development and support. However, it is time to consider the security tribe and to move security over to the left and make it core to what we do in DevOps: we need to move to DevSecOps.

Data is now more precious that gold, diamonds or shares in Apple. There are relentless and irresistible groups that are using increasingly sophisticated tools and techniques to penetrate defences and harvest data. The threat can come from state actors, criminal organisations, competitors or lone-wolf hackers determined to gain kudos and peer recognition. It seems like every week there is another major data breach, or we are sent a new credit card as the credentials have been compromised.

Attackers are creative, persistent and varied in their modes of attack. A security policy needs to take into account the likelihood of a determined attack being carried out across several different vectors simultaneously. They can attack through all technical channels as well as directly attempt to create social and behavioural attacks to gain access. A determined attacker can be patient, gain limited access and use that access to compile enough information to fully breach a system and steal information.

Traditionally security testing is something that happens late-stage in the development process. With DevOps we want to test and deploy continuously. Can we do this securely?

The threats

As data becomes more valuable and hacking a computer system becomes a safer option than robbing a bank. Organised crime will try and make a viable income stream from cyber theft. This means that more time and money will be invested by larger, better-funded actors. This means that the threats will increase in sophistication and diversity and at best we can only stay one step ahead. National states are increasingly turning to cyber weaponry to achieve their state goals. One outcome of this is the inevitable trickle-down of this cyber weapon technology into the hands of cyber-criminal groups who can modify it to achieve their goals, changing the payload to enable the stealthy delivery of malware.

I think we have to move away from the concept of security testing as an activity and start to consider security as an end-to-end process that is holistic across the enterprise and deeply embedded in everything we do.

Security by design

Security needs to be built into everything we engineer, for that to happen smoothly, security requirements need to be embedded into the design process in the same way that functional requirements are. This includes the infrastructure, network and applications. Guidelines for developers need to be produced that inform on secure engineering practices. When developers come into a DevOps organisation, the tools and frameworks should be in place to enable them to understand the development practices and standards to use. Known vulnerabilities need to be explicitly avoided, they should be included in design guidelines and developers’ coding standards. The key concept here is that we are in control of managing security risks from the outset and that security policymakers and developers are making informed decisions about security from the outset.

Scanning, automated testing, peer reviews

We need to develop and test continuously. We can integrate scanning tools into the DevOps pipeline and run these in the same way we continuously test functional code. Cloud infrastructure tools such as Microsoft Azure Advisor and third-party cloud scanning tools can be run as well as application scanners, such as OWASP ZAP, that will look for vulnerabilities in application code, should be considered in development squads and teams. It isn’t a total solution but will identify where known types of vulnerabilities have crept into the development process. Vulnerabilities can then be dealt with like any other defects in the code. They can then be prioritised.

Security tests can be automated and run as part of the DevOps pipeline in the same way as functional tests are. Tools such as BDD-Security or Gauntlet.io, can provide the automation test frameworks needed to run security test alongside functional tests.

Regular peer reviews and open discussions on security will help keep team members focused on security and emphasise the importance of keeping to build patterns. These techniques are not so much as to enforce the design guidelines but to keep everyone focused on the goal of building a secure application.

Penetration testing

Penetration testing, or ethical hacking, give security testers the opportunity to look for vulnerabilities in the solution as a whole. Penetration testers take on the role of hackers and perform simulated attacks on the system. However, while it is a necessary component in your cyber security arsenal, it is a manual process and cannot be integrated into the traditional DevOps pipeline. The purpose of penetration testing is to prove the design and build of the security requirements are sufficient to prevent malicious attacks. A policy decision needs to be made on where and when to use this technique. In the world of continuous deployment, our applications are changing, potentially many times a day. We need to determine what type of release we will use this technique on. Perhaps a policy of regular cycles of penetration testing might be an option.

Monitoring & analysis

The answer to the question of ‘what should be monitored?’ should be ‘everything that can be monitored!’. All system events should be monitored and analysed, including all system and firewall activity. I actually think this is now the most important form of defence that we now have. We have to accept that, despite all our security policies and defences, an attacker will find a way through. A way of identifying an attack might be in identifying a change in system behaviour or firewall activity.

An example could be where file-less malware has gotten in and is monitoring activity internally and send intelligence to an external entity in preparation for a more mature and dedicated attack. File-less malware attacks have risen by 94% in the first half of 2018, (SentinalOne), and are difficult for legacy anti-virus tools to identify. Other attack types are also increasing and the ability to prevent an attack from penetrating your defences is being challenged every minute of the day by new and unknown attackers.

Having a good picture of how your system operates when uninfected and monitoring for any deviations seems to be a sensible idea and using analysis tools, such as AI, to rapidly identify any unexpected deviation from the norm can only be a good thing.

Analysis tools can provide alerts and automatically generate issues that can be fed to a team’s backlog for prioritisation or immediate fix. AI tools can learn and adjust to new threats as they evolve.

Social & behavioural security

Although the above are means of creating a DevSecOps pipeline, the problem of securing the enterprise is not just technical, it is a ‘people problem’ as well. As we harden up our cyber-defences and become more security conscious, our people and processes will become relatively easier options to attackers.

An increasing number of attackers are collecting information on the internal workings and processes of an enterprise with the intention of developing a full-blown attack – where the attacker is making use of that internal knowledge of the organisation and exploiting the internal biases and cognitive vulnerabilities of the staff. This type of threat is now known as ‘advanced persistent threat’ and it is growing.

The only true defence against the infiltration of your internal communication processes is to increase the use of secondary validation techniques, a variation on secondary authentication. It is now no longer safe to authorise the change of payment details for a supplier on the strength of an e-mail from a known contact, the supplier’s e-mail system may have been hijacked and the mail is the result of intelligence gathering malware and a patient attacker developing the attack over time. A secondary form of authorisation needs to happen, such as a phone call, but not to a number on the e-mail!

These processes need to be thought through and prepared for as part of the attack will be to increase pressure on the recipient by saying that it is an urgent request, or by playing on a friendship or goodwill. Persuasion techniques are well known and will be integrated into the attack when it is played out.

Summary

Good security is not just about creating a DevSecOps pipeline. This will be a key component of it. It is a combination of many things that need to be thought through and understood clearly. A clear security policy needs to be in place and security needs to be an integral part of the DNA and thinking of the organisation. It isn’t just technology and it isn’t just people. The system we are protecting is the people and the technology interacting together.

Written by Quality Leader, Wayne Tofteroo

The post Going from DevOps to DevSecOps appeared first on DevOps Online North America.

]]>
Report predicts the cloud market to reach US$10.24 billion by 2022 https://devopsnews.online/report-predicts-cloud-market-reach-us10-24-billion-2022/ Wed, 28 Mar 2018 13:26:32 +0000 http://www.devopsonline.co.uk/?p=12204 A recent report predicts the cloud testing market is to grow from US$5.55billion in 2017 to US$10.24billion by 2022

The post Report predicts the cloud market to reach US$10.24 billion by 2022 appeared first on DevOps Online North America.

]]>
A recent report has predicted the cloud testing market is to grow from US$5.55billion in 2017 to US$10.24billion by 2022.

The Cloud Testing Market by Component (Testing Tools/Platforms and Services), Testing Tool/Platform (Functional Testing, API Testing), Service (Managed Services and Professional Services), Vertical, and Region – Global Forecast to 2022 report highlights cloud adoption rapidly growing, as well as flexible and scalable delivery models.

The adoption of cloud testing solutions and services is high in verticals such as retail and eCommerce; IT and telecom; banking, financial services, and insurance (BFSI); and media and entertainment – having an effect on the growth of the market as a whole.

Cloud computing solutions

The testing tools/platforms component is expected to grow at a higher CAGR during the forecast period, as tools/platforms assist organisations in easily carrying out the testing process in the cloud.

Furthermore, North America is expected to have the largest market share and is projected to dominate the market during the forecast period, according to the report.

With the increase in the adoption of cloud computing solutions among various verticals, the cloud testing market is also set to grow at a rapid pace in in well-established economies, such as the United States (US) and Canada.

Because of this, firms are willingly investing in the North American region, therefore, the competition is stiff amongst major market players.

Written from press release by Leah Alger

The post Report predicts the cloud market to reach US$10.24 billion by 2022 appeared first on DevOps Online North America.

]]>
IoT offers a ‘wealth of opportunity’ for the telecoms industry https://devopsnews.online/iot-offers-wealth-opportunity-telecoms-industry/ Tue, 20 Mar 2018 08:30:46 +0000 http://www.devopsonline.co.uk/?p=12133 The Internet of Things offers a wealth of opportunity for the telecoms industry, giving mobile operators a chance to develop and enhance their consumer offerings

The post IoT offers a ‘wealth of opportunity’ for the telecoms industry appeared first on DevOps Online North America.

]]>
The Internet of Things offers a wealth of opportunity for the telecoms industry, giving mobile operators a chance to develop and enhance their consumer offerings and increase market growth.

Research has suggested that the industry will grow from US$900billion in 2014 to US$4.3trillion by 2024. Despite this, alongside this raft of growth and opportunity comes the heightened risk of security breaches.

Operators need to be smart with their investment when it comes to IoT. It’s all well and good chasing new sales leads and initiatives and reaping the rewards, but security needs to be high, if not at the top, of their agenda. More than 30 billion connected devices will be in use by 2025, of which cellular IoT — including 2G, 3G and 4G technologies – is forecast to account for about seven billion units.

Security attacks

With the increased number of devices accessing the core network, operators need to ensure they plan for the worse and have prevention measures in place for possible hijackers. The repercussions of such a breach can have serious consequences for both the operator and end user, as any device hijack can be a potential entry point to the network for an attack.

Security attacks can come in all different shapes and sizes. One of the more common breaches is the “man-in-the-middle” concept, whereby a hacker is looking to interrupt and breach communications between two separate systems. This attack can have severe consequences as the hacker secretly intercepts and sends messages between two parties when they are under the belief that they are communicating directly with each other.

Following this, the hacker can trick the recipient into thinking they are still getting a legitimate message. These attacks can leave the networks, and end-users, in a position of extreme vulnerability with regards to IoT, due to the nature of the devices being hacked. For example, these devices can be anything from industrial tools, machinery or transportation to innocuous connected “things” such as smart TV’s or connected fridges.

DDoS attacks

Another common threat posed to IoT networks is the denial of service (DoS) attacks. There can be a host of reasons for the network being unavailable, but it usually refers to the infrastructure that cannot cope due to capacity overload. In a Distributed Denial of Service (DDoS) attack, a large number of systems maliciously attack one target.

In comparison to hacking attacks like phishing or brute-force attacks, DDoS doesn’t usually try to steal information or leads to security loss, but the loss of reputation for the affected company can still cost a lot of time and money. Often customers also decide to switch to a competitor, as they fear security issues or simply can’t afford to have an unavailable service.

To tackle these issues, it’s paramount that access to the IoT devices for the applications should be through a controlled and secure environment that first authenticates and authorizes the user/application before allowing access to the core.

GTP and SCTP protocols

The first step for operators is to ensure any connection from the IoT device to the core network over S1 and Gb interfaces is fully authenticated. In order to do this, they must invest in and revisit the capabilities of their GTP and SCTP protocols, which will handle the hundreds of connections into the core network.

Authentication can be delivered by the RFC 4895 for the SCTP protocol without compromising performance or network monitoring visibility like IPsec/VPNs do. This can prove vital as networks are subject to attacks with greater frequency and demonstrated disastrous outcomes.

Alongside a highly reliable SCTP protocol, operators should implement a DTLS module. Such a solution gives operators peace of mind that eavesdropping and network tampering is dealt with, as well as helping detect and fix real-time connection failures, redundancy and fault tolerance for signaling applications and improved destination and peer path failure.

‘IoT provides a wealth’

In addition, it can also resolve the issue of bottlenecking in networking due to Diameter signaling, by allowing the Linux host to provide thousands of associations and connections.

It’s clear that the IoT provides a wealth of business and marketing opportunities for operators. But to ensure it’s not a short-lived fad, security must be taken seriously. Attacks on the networks can have detrimental impacts on both the operators, who can have their reputation diminished in seconds if vulnerabilities are publicised, and end-users, whose devices, and therefore livelihoods, are at risk.

Now is the time for the industry to lay down the foundations and realise the tools and protocols needed to secure the future.

Written by Robin Kent, director of European operations, Adax

The post IoT offers a ‘wealth of opportunity’ for the telecoms industry appeared first on DevOps Online North America.

]]>
Join the conversation, join Software Testing Community https://devopsnews.online/join-software-testing-communityjoin-software-testing-community/ Mon, 09 Oct 2017 10:44:54 +0000 http://www.devopsonline.co.uk/?p=10464 Join the Software Testing Community to post and share thoughts, opinions and advice regarding the engaging industry

The post Join the conversation, join Software Testing Community appeared first on DevOps Online North America.

]]>
Join the Software Testing Community to post and share thoughts, opinions and advice regarding the engaging industry.

Telling us your thoughts can help us master the profession; as well us supply our readers with what they look for in a publication.

Not forgetting you can discuss and ask questions on engaging topics and receive helpful answers. Our thought-provoking topics include: Machine Learning, Cyber Security, Agile, Automation, Products and Services, Quality Assurance, Testing Tools, Training and Certification, Industry Events, General Topics and DevOps.

Because working together and sharing ideas with like-minded individuals has never been so important…

Join the conversation, join Software Testing Community 

Written by Leah Alger

The post Join the conversation, join Software Testing Community appeared first on DevOps Online North America.

]]>