Giter Site home page Giter Site logo

codywalker77 / awesome-oss-devsec Goto Github PK

View Code? Open in Web Editor NEW

This project forked from boxyhq/awesome-oss-devsec

0.0 0.0 0.0 117 KB

An awesome list of OSS developer-first security tools

Home Page: https://devsecmesh.boxyhq.com

License: Apache License 2.0

awesome-oss-devsec's Introduction

Developer Security Mesh

DevSecMesh is BoxyHQ’s upcoming product to automate security in all parts of your tech stack. By combining Security as Code, security playbooks, compliance controls and some incredible open-source security tools DevSecMesh provides complete automation of your product security. Think of it as an extension of your security team or your security team if you don’t have one.

In the meantime we have curated a list of awesome developer-first security principles for your product. And a set of free OSS tools to use for it where applicable. It is heavily inspired by MVSP, a minimum security baseline for enterprise-ready products and services. Our missions align and we have recently joined their working group.

Designed with simplicity in mind the checklist contains security controls, their description, relevance to popular compliance certifications (like ISO27001, SOC2, MVSP, etc.) and open-source tools you can readily use to automate it.

Shift-left security allows developers to keep pace with agile development and continuous deployment but it’s simply not enough to provide tools that are designed for security teams. What is needed instead is developer tools built for security, allowing developers to built secure products without adding additional work.

We’d love your feedback and contributions to this list. Please submit an issue, PR or reach out to us at [email protected]

We have also consolidated a list of popular compliance frameworks and certifications that you might find interesting.

If you are interested in Developer Security and DevSecOps in general, we invite you to join our Discord community and share more.

Awesome OSS Developer Security Tools

Business controls

Control

Description

Compliance Controls

Tools (if applicable)

Vulnerability reports

  • Publish the point of contact for security reports on your website

  • Respond to security reports within a reasonable time frame

  • MVSP 1.1

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

Customer testing

  • On request, enable your customers or their delegates to test the security of your application

  • Test on a non-production environment if it closely resembles the production environment in functionality

  • Ensure non-production environments do not contain production data

  • MVSP 1.2

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

External testing

Contract a security vendor to perform annual, comprehensive penetration tests on your systems

  • MVSP 1.4

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

Training

Implement role-specific security training for your personnel that is relevant to their business function

Compliance

  • Comply with all industry security standards relevant to your business such as PCI DSS, HITRUST, ISO27001, and SSAE 18

  • Comply with local laws and regulations in jurisdictions applicable to your company and your customers, such as GDPR, Binding Corporate Rules, and Standard Contractual Clauses

Incident management

  • Notify your customers about a breach without undue delay, no later than 72 hours upon discovery

  • Include the following information in the notification:

    • Relevant point of contact

    • Preliminary technical analysis of the breach

    • Remediation plan with reasonable timelines

Application design controls

Control

Description

Compliance Controls

Tools (if applicable)

Single Sign-On

Implement single sign-on using modern and industry standard protocols

Access Control

  • Implement strict access control in your application guarding resources as needed

  • Allow easy provisioning and de-provisioning of users

  • ISO 27001 A.9.1.1, A.9.2.1

  • SOC2 CC6.1

HTTPS-only

  • Redirect traffic from HTTP protocol (port 80) to HTTPS (port 443)

    This does not apply to secure protocols designed to run on top of unencrypted connections, such as OCSP
  • Produce a clear scan using a widely adopted TLS scanning tool

  • Include the Strict-Transport-Security header on all pages with the includeSubdomains directive

  • MVSP 2.2

  • ISO 27001 A.10.1.1

  • SOC2 CC6.7

Dependency Patching

Apply security patches with a severity score of "medium" or higher, or ensure equivalent mitigations are available for all components of the application stack within one month of the patch release

  • MVSP 2.6

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

Logging

Keep logs of:

  • Users logging in and out

  • Read, write, delete operations on application and system users and objects

  • Security settings changes (including disabling logging)

  • Application owner access to customer data (access transparency)

Logs must include user ID, IP address, valid timestamp, type of action performed, and object of this action. Logs must be stored for at least 30 days, and should not contain sensitive data or payloads.

  • MVSP 2.7

  • ISO 27001 A.12.4.1

  • SOC2 CC7.2

Backup and Disaster recovery

  • Securely back up all data to a different location than where the application is running

  • Maintain and periodically test disaster recovery plans

  • Periodically test backup restoration

Encryption

Use available means of encryption to protect sensitive data in transit between systems and at rest in online data storages and backups

  • MVSP 2.9

  • ISO 27001 A.10.1

  • SOC2 CC6.1

  • GDPR

  • HIPAA

  • BoxyHQ Privacy Vault (coming soon)

Application implementation controls

Control

Description

Compliance controls

Tools (if applicable)

List of sensitive data

Maintain a list of sensitive data types that the application is expected to process

  • MVSP 3.1

  • ISO 27001 A.10.1

  • SOC2 CC6.1

  • GDPR

  • HIPAA

  • BoxyHQ Privacy Vault (coming soon)

Data flow diagram

Maintain an up-to-date diagram indicating how sensitive data reaches your systems and where it ends up being stored

  • MVSP 3.2

  • ISO 27001 A.10.1

  • SOC2 CC6.1

  • GDPR

  • HIPAA

  • BoxyHQ Privacy Vault (coming soon)

Vulnerability prevention

Train your developers and implement development guidelines to prevent at least the following vulnerabilities:

  • Authorization bypass

  • Insecure session ID

  • Injections

  • Cross-site scripting

  • Cross-site request forgery

  • Use of vulnerable libraries

  • MVSP 3.3

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

Infrastructure and cloud security

Perform audits, continuous monitoring, hardening and forensics readiness for your infrastructure and cloud assets.

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

Code security

Control

Description

Compliance controls

Tools (if applicable)

Data leakage prevention

Protect secrets from leaking into code, logs and unwanted systems.

  • ISO 27001 A.12.6.1

  • SOC2 CC7.1

awesome-oss-devsec's People

Contributors

bob-bot avatar deepakprabhakara avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.