diff --git a/rules/developer-cybersecurity-tools/rule.md b/rules/developer-cybersecurity-tools/rule.md index 31568853cfa..45a9c992ec7 100644 --- a/rules/developer-cybersecurity-tools/rule.md +++ b/rules/developer-cybersecurity-tools/rule.md @@ -2,70 +2,93 @@ type: rule tips: "" title: Do you use the right cybersecurity tools when writing code? -seoDescription: Developers must use essential cybersecurity tools to secure - their code, prevent vulnerabilities, and safeguard user data. Learn the best - tools to enhance security. +seoDescription: Developers must use essential cybersecurity tools to secure their code, prevent vulnerabilities, and safeguard user data. Learn the best tools to enhance security. uri: developer-cybersecurity-tools authors: - title: Rob Thomlinson url: https://www.ssw.com.au/people/rob-thomlinson guid: d6dc22d5-5862-4d46-8ef6-7b661ac65dab --- + Security should never be an afterthought when writing code. Every year, developers introduce vulnerabilities that lead to data breaches, financial losses, and reputational damage. The right cybersecurity tools can help identify security risks early, prevent attacks, and ensure compliance with security best practices. -### Essential Cybersecurity Tools for Developers +## Essential cybersecurity tools for developers To write secure code, developers should use a combination of tools that cover different aspects of application security: -#### 1. **Static Application Security Testing (SAST) Tools** -SAST tools analyse source code for security vulnerabilities without executing the program. They help catch common issues such as SQL injection, cross-site scripting (XSS), and insecure dependencies. -✅ Recommended tools: -- **SonarQube** (for code quality and security) -- **Semgrep** (lightweight static analysis) -- **Checkmarx** (enterprise-grade security scanning) - -#### 2. **Dynamic Application Security Testing (DAST) Tools** -DAST tools test running applications by simulating attacks. They help identify vulnerabilities that might not be visible in the source code, such as misconfiguration and runtime security flaws. -✅ Recommended tools: -- **OWASP ZAP** (open-source web application security scanner) -- **Burp Suite** (penetration testing toolkit) - -#### 3. **Software Composition Analysis (SCA) Tools** -Most applications rely on open-source dependencies, which may contain security vulnerabilities. SCA tools scan dependencies for known vulnerabilities and recommend patches. -✅ Recommended tools: -- **Dependabot** (GitHub-integrated automated dependency updates) -- **Snyk** (real-time vulnerability detection and fixes) -- **OSS Index** (open-source security scanner) - -#### 4. **Secrets Detection Tools** -Developers sometimes accidentally commit API keys, passwords, or credentials to repositories. Secrets detection tools scan code to prevent such leaks. -✅ Recommended tools: -- **GitGuardian** (real-time secret scanning for repositories) -- **TruffleHog** (deep secrets detection in git history) - -#### 5. **Container and Cloud Security Tools** -If your application runs in containers or the cloud, security must extend beyond your code. -✅ Recommended tools: -- **Docker Scout** (container image vulnerability scanning) -- **Kube-bench** (Kubernetes security benchmarking) -- **AWS Inspector** (security assessment for cloud workloads) - -#### 6. **Code Signing and Supply Chain Security** -With software supply chain attacks on the rise, developers should ensure that their code and dependencies are verified and secure. -✅ Recommended tools: -- **Sigstore Cosign** (secure code signing) -- **in-toto** (software supply chain verification) - -#### 7. **API Security Testing Tools** +### 1. Static Application Security Testing (SAST) Tools + +SAST tools analyse source code for security vulnerabilities without executing the program. They help catch common issues such as SQL injection, cross-site scripting (XSS), and insecure dependencies. + +✅ Recommended tools: + +* **SonarQube** (for code quality and security) +* **Semgrep** (lightweight static analysis) +* **Checkmarx** (enterprise-grade security scanning) + +### 2. Dynamic Application Security Testing (DAST) tools + +DAST tools test running applications by simulating attacks. They help identify vulnerabilities that might not be visible in the source code, such as misconfiguration and runtime security flaws. + +✅ Recommended tools: + +* **OWASP ZAP** (open-source web application security scanner) +* **Burp Suite** (penetration testing toolkit) + +### 3. Software Composition Analysis (SCA) tools + +Most applications rely on open-source dependencies, which may contain security vulnerabilities. SCA tools scan dependencies for known vulnerabilities and recommend patches. + +✅ Recommended tools: + +* **Dependabot** (GitHub-integrated automated dependency updates) +* **Snyk** (real-time vulnerability detection and fixes) +* **OSS Index** (open-source security scanner) + +### 4. Secrets Detection tools + +Developers sometimes accidentally commit API keys, passwords, or credentials to repositories. Secrets detection tools scan code to prevent such leaks. + +✅ Recommended tools: + +* **GitGuardian** (real-time secret scanning for repositories) +* **TruffleHog** (deep secrets detection in git history) + +### 5. Container and Cloud Security tools + +If your application runs in containers or the cloud, security must extend beyond your code. + +✅ Recommended tools: + +* **Docker Scout** (container image vulnerability scanning) +* **Kube-bench** (Kubernetes security benchmarking) +* **AWS Inspector** (security assessment for cloud workloads) + +### 6. Code Signing and Supply Chain Security + +With software supply chain attacks on the rise, developers should ensure that their code and dependencies are verified and secure. + +✅ Recommended tools: + +* **Sigstore Cosign** (secure code signing) +* **in-toto** (software supply chain verification) + +### 7. **API Security Testing tools + APIs are a common attack vector, and testing them for security vulnerabilities is crucial. API security testing tools help developers validate authentication, authorization, and request handling. + ✅ Recommended tools: -- **Insomnia** (secure API testing with authentication and encryption support) -- **Postman** (API development and security testing) -- **OWASP Amass** (API reconnaissance and security analysis) -### Pro Tip: Automate Security in Your CI/CD Pipeline +* **Insomnia** (secure API testing with authentication and encryption support) +* **Postman** (API development and security testing) +* **OWASP Amass** (API reconnaissance and security analysis) + +--- + +## Pro tip: Automate security in CI/CD pipelines + Set up your cybersecurity tools to run automatically on every pull request. This ensures security checks are continuous and prevent vulnerabilities from slipping into production. By integrating these cybersecurity tools into your development workflow, you can write secure code, protect user data, and reduce the risk of security incidents. diff --git a/rules/sysadmin-cybersecurity-tools/rule.md b/rules/sysadmin-cybersecurity-tools/rule.md index 07b5404ce4c..18ca063ac20 100644 --- a/rules/sysadmin-cybersecurity-tools/rule.md +++ b/rules/sysadmin-cybersecurity-tools/rule.md @@ -13,93 +13,129 @@ related: - penetration-testing guid: d6dc22d5-5862-4d46-8ef6-7b661ac65dab --- + Cybersecurity threats are constantly evolving, as a sysadmin, it's your job to stay ahead. Using the right tools can mean the difference between a secure environment and an incident. Relying only on the default security features is not enough these days, proactive defence is key. ### Essential Cybersecurity Tools for Sysadmins -A well-rounded cybersecurity strategy should include tools for: - +A well-rounded cybersecurity strategy should include tools for: #### 1. **Active Directory Security** + Active Directory Security tools are used for on-demand secrity assessments of the environment these tools can prevent misconfiguration of an AD Environment. + ✅ Recommended tools: -- **PingCastle** -- **BloodHound** + +* **PingCastle** +* **BloodHound** #### 2. **Vulnerability Management** + Provideds Centralised reporting for all potential vulnerabilities in a companies system. + ✅ Recommended tools: -- **Nessus** -- **Qualys** -- **OpenVAS** + +* **Nessus** +* **Qualys** +* **OpenVAS** #### 3. **Patch Management** + Allows SysAdmins to deploy regular patches to company hardware. + ✅ Recommended tools: -- **Patch ManageEngine** -- **WSUS (Windows Server Update Services)** + +* **Patch ManageEngine** +* **WSUS (Windows Server Update Services)** #### 4. **Multi-Factor Authentication (MFA)** + Ensures users are protected even if their passwords are breached. + ✅ Recommended tools: -- **Duende Identity Server** -- **Microsoft Entra ID (formerly Azure AD)** -- **Okta** -- **Duo Security** + +* **Duende Identity Server** +* **Microsoft Entra ID (formerly Azure AD)** +* **Okta** +* **Duo Security** #### 5. **Privileged Access Management (PAM)** + Protects companies most sensitive systems and ensurses that they only have the necessary level of access to complete tasks. + ✅ Recommended tools: -- **CyberArk** -- **BeyondTrust** - -#### 6. **Automated Backup Solutions**: + +* **CyberArk** +* **BeyondTrust** + +#### 6. **Automated Backup Solutions** + Automated backup solutions and backup solutions that promote immutable backups can protect companies from ransomware attacks. + ✅ Recommended tools: -- **Veeam** -- **Acronis** -- **Azure Backup** + +* **Veeam** +* **Acronis** +* **Azure Backup** #### 7. **Endpoint Security Suites** + Endpoint security tools help protect companies from currently infected devices. + ✅ Recommended tools: -- **Microsoft Defender for Business** -- **Bitdefender** -- **Sophos** + +* **Microsoft Defender for Business** +* **Bitdefender** +* **Sophos** #### 8. **Email Filtering & Phishing Protection** + Email and phising tools prevent organisations from receiveing malicious emails. + ✅ Recommended tools: -- **Microsoft Defender for Office 365** -- **Proofpoint** -- **Mimecast** + +* **Microsoft Defender for Office 365** +* **Proofpoint** +* **Mimecast** #### 9. **Penetration Testing** + These are specialised tools used to test a wide variety of scenarios + ✅ Recommended tools: -- **Metasploit** -- **Nmap** -- **Kali OS** + +* **Metasploit** +* **Nmap** +* **Kali OS** #### 10. **SIEM (Security Information and Event Management)** + SIEM tools allow us to create a centralised view of all security and event logs in an organisation + ✅ Recommended tools: -- **Microsoft Sentinel** -- **Splunk** + +* **Microsoft Sentinel** +* **Splunk** #### 11. **EDR (Endpoint Detection and Response)** + EDR Tools allow us to identify systems at risk and run automated fixes for known issues. + ✅ Recommended tools: -- **Microsoft Defender for Endpoint** -- **CrowdStrike Falcon** + +* **Microsoft Defender for Endpoint** +* **CrowdStrike Falcon** #### 12. **Adversary Simulation** + Specialised tools to simulate cybersecurity threats in an organisation + ✅ Recommended tools: -- **Cobalt Strike** -- **Havoc Framework** + +* **Cobalt Strike** +* **Havoc Framework** ### Implementing a Strong Cybersecurity Strategy