Book Image

Practical Security Automation and Testing

By : Tony Hsiang-Chih Hsu
Book Image

Practical Security Automation and Testing

By: Tony Hsiang-Chih Hsu

Overview of this book

Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention. This book will teach you to adopt security automation techniques to continuously improve your entire software development and security testing. You will learn to use open source tools and techniques to integrate security testing tools directly into your CI/CD framework. With this book, you will see how to implement security inspection at every layer, such as secure code inspection, fuzz testing, Rest API, privacy, infrastructure security, and web UI testing. With the help of practical examples, this book will teach you to implement the combination of automation and Security in DevOps. You will learn about the integration of security testing results for an overall security status for projects. By the end of this book, you will be confident implementing automation security in all layers of your software development stages and will be able to build your own in-house security automation platform throughout your mobile and cloud releases.
Table of Contents (19 chapters)

Questions

  1. Which one of the following does not apply to white-box scanning?
    • Web UI testing
    • Privacy scanning PII
    • Secure code scanning
  2. What is the objective of PII discovery?
    • To discern the types of PII
    • To see how the PII is classified
    • All of above
  3. What is the regular expression for IP address?
    • /([a-z0-9_\-.+]+)@\w+(\.\w+)*
    • \d{4}[ -]?\d{4}[ -]?\d{4}[ -]?\d{4}|\d{4}[ -]?\d{6}[ -]?\d{4}\d?
    • \b(?:\d{1,3}\.){3}\d{1,3}\b
  4. Why are we looking for Base64 encoding?
    • Any password encoded with Base64 is very vulnerable and can be easily reversed
    • To ensure there is no possibility of injection attack
    • To avoid backdoor connection behavior