Security automation improves an organization’s security posture. When done effectively, it enables organizations to scale existing tooling, reduce manual processes, and integrate cybersecurity deeper into the business.
For cybersecurity professionals, security automation and orchestration enable preventative, investigative, and monitoring activities to be deeply integrated into daily operations. This creates more confidence in the product’s security, reduces alert fatigue, and improves investigative outcomes.
This article explores how security automation can assist with the preproduction and production stages of software development. It is written for cybersecurity professionals, and each section contains one or more practical examples of security automation in action.
Summary of key security automation opportunities
The table below summarizes the concepts covered in this article.
The rest of this article delves into each concept introduced in the table above. Each section provides more context about a specific concept and provides a practical example of it in action.
Workflow orchestration and automation for security teams
- No code or low code - no custom development necessary
- Integrates with all your systems - internal and external
- Built-in safeguards like credential management and change control
Source code review and dependency management
Security automation enables organizations to combine static application security testing (SAST) tools into a holistic source code review and dependency management program. SAST assesses source code for vulnerabilities, application design flaws, and insecure code; it typically includes scanning native source code and code dependencies such as third-party libraries.
Various tools simplify SAST for developers. Snyk Code integrates with popular integrated development environments (IDEs). IDEs such as Visual Studio Code (VS Code) can integrate SAST tools to secure code as it’s written, providing real-time reports and checks for developers. GitHub’s Dependabot generates alerts when vulnerabilities are detected in dependencies used by a project’s code base.
Snyk Code Report (source)
Here, a security workflow orchestration and automation tool called Tines takes the output of Snyk’s code-scanning capabilities and scales it across the entire organization. As vulnerabilities are identified, they are matched against predefined thresholds, and JIRA tickets are created.
Query Snyk & gather a vulnerability report
Query each project within all Synk organizations for critical vulnerabilities. Create a custom report in Jira for each organization, containing only those Snyk projects which meet specific vulnerability severity.
Tools
CI/CD pipeline
Security automation increases the security of continuous integration / continuous deployment (CI/CD) pipelines and enables the integration of dynamic application security testing (DAST). Combining these two aspects improves the security of the software product while reducing the likelihood of poisoned pipeline execution attacks.
CI/CD pipeline security
Businesses face a dilemma when protecting CI/CD pipelines from poisoned pipeline execution attacks. Rapid deployment capabilities become meaningless if securing them requires more resources than previous methods.
Security orchestration and automation offer a solution to this dilemma. It preserves CI/CD’s rapid deployment advantages while also allowing the integration of cybersecurity tooling.
Security automation can help by doing the following:
Automating secure container configurations, including endpoint detection and response (EDR) tools, log specifications, and container secrets management.
Enforcing role-based access controls (RBAC) throughout CI/CD pipeline infrastructure, including temporary credential creation and teardown
Implementing secrets management throughout the CI/CD pipeline
Configuring secure network configurations during each stage of the pipeline
Configuring static code analysis in the pipeline builds (discussed previously)
Dynamic application security testing (DAST)
DAST ensures that applications are not susceptible to known vulnerabilities and automated attack vectors. Tools such as Tenable Vulnerability Management simulate events that expose vulnerabilities in an application and then observe how the application responds. The response determines whether the application is vulnerable to that sequence of events.
Successfully passing DAST assures organizations that the application is not vulnerable to these known vulnerabilities.
Security orchestration and automation enable DAST to be integrated into a CI/CD pipeline. For example, the workflow below launches a Tenable scan on a specific web app each time a CI/CD pipeline process is triggered. Once the scan is completed, a report is generated and emailed to a decision-maker.