How Tide transitioned to developer-first security with Semgrep

semgrep
10 Nov 202325:40

Summary

TLDRDeani, a senior product security engineer at Tide, discusses her role in integrating security into the software development lifecycle. She emphasizes the importance of a secure SDLC model, empowering developers to 'shift left' and prioritize security from the design phase. Tide focuses on reducing false positives and enabling custom rule creation, which has led to a 100% fix rate for vulnerabilities. Deani also highlights the success of Tide's Security Champions program, which educates and involves developers in creating and managing security rules, fostering a proactive security culture.

Takeaways

  • 😀 Davani is a product security professional with extensive experience in safeguarding web and mobile applications.
  • 🏢 Tide is a leading provider of digital business banking services, offering mobile-first solutions for small and medium-sized businesses.
  • 🔐 Davani's role at Tide focuses on implementing a secure SDLC model, emphasizing a 'shift left' approach to integrate security early in the development process.
  • 🤝 Tide's security team adopts a collaborative approach, aiming to empower developers with security knowledge and tools rather than a punitive model.
  • 🛠️ Tide's security strategy includes the use of various security tools and methodologies, with a specialization in OAS (Open Application Security).
  • 🔍 Tide's team is particularly interested in reducing false positives in security scanning and empowering developers to own and manage security rules.
  • 🛡️ Tide has implemented custom rules with a 100% fix rate, significantly reducing the burden on developers by eliminating false positives.
  • 🤖 The introduction of AI capabilities in security tools like Semgrep has been welcomed by Tide's team for its ability to provide real-time, context-specific advice.
  • 🔑 Tide is keen on integrating new features such as IDE integrations and secret scanning to further enhance security practices and reduce false positives.
  • 🌟 Tide's Security Champions program plays a crucial role in fostering a security-aware culture among developers and promoting the adoption of security best practices.

Q & A

  • What is Deani's role at Tide?

    -Deani is the Senior Product Security Engineer at Tide, focusing on providing a secure Software Development Life Cycle (SDLC) model, empowering developers with security knowledge, and ensuring security is integrated at every step of the development process.

  • What does Tide provide as a company?

    -Tide is a leading provider for digital business banking, offering mobile-first business accounts to small and medium-sized businesses. They provide instant account opening and a range of financial services.

  • How does Tide align security with its business goals?

    -Tide's security team focuses on enabling the 'shift left' principle, integrating security from the design phase through development, and ensuring security is embedded at every step to reduce risks and increase resilience.

  • Why was reducing false positives a significant concern for Tide?

    -Tide aimed to prevent high and critical issues from reaching production. They sought tools that would minimize false positives to avoid blocking developers' work, ensuring a smoother and more efficient development process.

  • What was the major advantage Tide found with Semgrep's reachability analysis?

    -Semgrep's reachability analysis was a major selling point for Tide as it significantly reduced false positives by ensuring that only vulnerabilities in the code that are actually reachable are flagged, thus improving the accuracy of security assessments.

  • How does Tide involve its engineers in creating custom security rules?

    -Tide has a security Champions program where they involve engineers in creating custom rules. They provide education and tools, encouraging developers to take an active role in identifying and addressing security concerns within their code.

  • What is the significance of Tide's 100% fix rate for custom rules?

    -Tide achieved a 100% fix rate for custom rules, indicating that all identified vulnerabilities by these rules were addressed by developers, demonstrating the effectiveness of their security practices and the engagement of their engineering team.

  • How does Tide plan to scale the creation and management of custom rules?

    -Tide plans to scale custom rule creation by continuing to educate and empower their developers through the security Champions program, providing them with the tools and knowledge to manage security rules within their projects.

  • What are Tide's thoughts on the new AI capabilities in Semgrep?

    -Deani expresses enthusiasm for Semgrep's AI capabilities, as it offers real-time assistance and remediation advice, which can help developers understand and resolve security issues more efficiently.

  • How does Tide view the integration of Semgrep with IDEs?

    -Tide sees the integration of Semgrep with IDEs as a valuable 'shift left' approach, allowing developers to address security issues right from the coding phase, which can further streamline the development process.

  • What is Tide's stance on the recent feature of secret scanning in Semgrep?

    -Tide recognizes the importance of secret scanning to prevent the disclosure of sensitive information. They appreciate Semgrep's approach to reducing false positives by focusing on active secrets, which helps developers focus on relevant security issues.

Outlines

00:00

👋 Introduction and Welcome

The script begins with a host welcoming the audience and introducing Deani from Tide Financials, a product security professional with extensive experience in safeguarding web and mobile applications. Deani's role involves implementing robust security frameworks and integrating security into the software development life cycle at Tide, a leading fintech company. The host encourages audience interaction through Zoom reactions or Slack and sets the stage for an informative session by asking Deani to explain Tide's services and her role there. Deani outlines Tide's focus on digital business banking for small to medium-sized businesses with a mobile-first approach and her mission to empower developers with security knowledge.

05:00

🔒 Shifting Security Left

Deani discusses Tide's security strategy, emphasizing the 'shift left' approach, which aims to integrate security from the design phase through development. She highlights the importance of risk assessments and embedding security tools like SAST and SCA in the build pipelines. The conversation shifts to Tide's experience with SRE, where Deani shares her team's focus on reducing false positives and custom rule capabilities. She explains how Tide's security team aligns with the company's goals by ensuring security is a priority in every phase of the software development process.

10:01

🛠️ Custom Rules and Developer Empowerment

Deani delves into Tide's implementation of custom rules, explaining how they've worked with developers to create rules that yield a 100% fix rate, effectively eliminating false positives. She introduces Tide's Security Champions program, which involves developers in the security process, allowing them to understand and create rules that secure their code. The program fosters a collaborative environment where developers are encouraged to take ownership of security measures, leading to more secure software development.

15:02

🌟 New Features and Integrations

The discussion turns to new features introduced by SRE, such as AI capabilities and IDE integrations. Deani expresses enthusiasm for AI's potential to provide real-time remediation advice, simplifying the developer's workflow by reducing the need for manual research. She also mentions the interest from Tide's developers in integrating SRE's IDE tools to catch security issues early in the development process. Deani anticipates the benefits of these features in enhancing Tide's security practices and reducing the workload on the security team.

20:04

🏆 Closing and Future Integrations

In the final paragraph, the host thanks Deani for her insights and contributions to the session. Deani expresses her eagerness to integrate more of SRE's features at Tide, particularly the AI assistant and secret scanning, which aligns with Tide's goal of minimizing false positives and empowering developers. The host invites any final questions from the audience before concluding the session and Deani prepares to leave for other commitments, having shared valuable knowledge and experiences.

Mindmap

Keywords

💡Product Security

Product Security refers to the measures taken to protect software products and services from vulnerabilities, threats, and attacks. In the video, Davani, a product security professional, discusses her role in safeguarding web and mobile applications, emphasizing the importance of implementing robust security frameworks to reduce risks and increase resilience.

💡Shift Left

Shift Left is a software development approach where security is integrated into the early stages of the development lifecycle, rather than being an afterthought. Davani mentions that her team's main goal is to enable this principle, ensuring that security is considered from the design phase through development, aiming to prevent high and critical issues from reaching production.

💡SDLC (Software Development Life Cycle)

SDLC is the process followed by a development team to design, develop, test, and deploy an application. In the context of the video, Davani's role involves providing a secure SDLC model, which means integrating security practices at every step of the software development process to ensure the security of the final product.

💡Security Champions

Security Champions are individuals within an organization who are responsible for promoting security awareness and best practices among their peers. Davani discusses Tide's Security Champions program, where these champions are the first to look at new tools and features, and they help in educating their colleagues about security practices and custom rule creation.

💡Custom Rules

Custom Rules are user-defined rules that allow developers to specify security checks that are tailored to their specific application needs. Davani explains that Tide has created custom rules with the help of their engineers, which has resulted in a 100% fix rate, indicating that these rules are effective and well-understood by the development team.

💡Reachability Analysis

Reachability Analysis is a feature in security tools that helps identify if a third-party package or component is actually being used in the application's source code. Davani mentions that this feature was a major selling point for Tide when choosing a security tool, as it significantly reduced the number of false positives by focusing only on reachable vulnerabilities.

💡False Positives

False Positives occur when a security tool incorrectly flags a benign piece of code as a vulnerability. The video discusses the importance of reducing false positives to avoid unnecessary work and frustration for developers. Tide's adoption of a security tool with reachability analysis helped them reduce false positives by 80%.

💡Threat Modeling

Threat Modeling is the process of identifying potential threats and vulnerabilities in a system and devising strategies to mitigate them. Davani mentions that Tide's security team performs threat modeling sessions, which include developers and security champions, to foster a proactive approach to security.

💡IDE Integrations

IDE Integrations refer to the incorporation of security tools directly into Integrated Development Environments (IDEs) used by developers. Davani expresses interest in integrating security tools like Semgrep into IDEs to enable developers to catch and fix security issues earlier in the development process, even before code is committed to version control systems.

💡Secret Scanning

Secret Scanning is the process of detecting and alerting on the presence of sensitive secrets, such as API keys or passwords, within codebases. Davani highlights the importance of this feature, especially in the context of reducing false positives by focusing on active secrets, as it helps Tide's developers ensure that sensitive information is not inadvertently exposed in their applications.

Highlights

Deani from Tide Financials emphasizes the importance of integrating security into the software development lifecycle.

Tide is a leading provider of digital business banking, offering mobile-first services to small and medium-sized businesses.

Deani's role involves ensuring a secure SDLC model, empowering developers to adopt security practices early in the development process.

Tide's security team focuses on reducing risks and increasing the resilience of their software through collaboration and education.

Deani discusses the selection criteria for security tools, prioritizing those that are user-friendly and can be easily adopted by engineers.

Tide has successfully reduced false positives by 80% using Semgrep's reachability analysis feature.

Custom rule capabilities in Semgrep allow Tide's engineers to create rules that achieve a 100% fix rate.

The security Champions program at Tide educates and involves engineers in creating and managing security rules.

Deani highlights the importance of threat modeling sessions in fostering a security-aware culture among developers.

Tide's approach to security is collaborative, aiming to provide developers with the tools and knowledge to make secure decisions.

Semgrep's AI capabilities, such as the assistant feature, are seen as a valuable resource for real-time security guidance.

Integration of Semgrep with IDEs like VS Code and JetBrains is a step towards earlier detection of security issues.

Deani expresses interest in exploring Semgrep's secret scanning feature to prevent the disclosure of sensitive information.

Tide's security team is keen on integrating new features that reduce false positives and improve developer efficiency.

Deani shares her personal experience with Semgrep's AI assistant, appreciating its real-time remediation advice.

The transcript concludes with a discussion on the future integration of Semgrep's new features at Tide.

Transcripts

play00:01

[Music]

play00:06

good morning good afternoon everybody

play00:08

thank you for joining us we are very

play00:11

lucky to have um uh with us davani from

play00:17

tide so deani is a product security

play00:20

professional she's been the industry for

play00:22

many years hands on experience with

play00:25

safeguarding web and mobile applications

play00:28

um she studied cyber security as part of

play00:31

her

play00:32

education uh specializing in

play00:34

implementation of robust security

play00:36

Frameworks and in her current role at

play00:39

tide tide financials which is one of the

play00:42

leading uh finex she's been instrumental

play00:47

in pushing out security uh into their

play00:51

software development life cycle reducing

play00:53

the risks um and in general increasing

play00:57

the overall resilience um and and she's

play01:00

also proficient with a lot of tools from

play01:02

a security perspective and methodologies

play01:05

with a specialization in OAS so please

play01:09

join me in welcoming her with a big

play01:11

round of applause you could use the zoom

play01:13

reactions if you want or you could do it

play01:17

uh yes as well so thank you for uh that

play01:21

um uh welcome deani uh thank you for

play01:24

your time um just a quick note from a

play01:28

from a housekeeping perspective so I

play01:31

have a few questions we're going to

play01:32

start off with but if you guys have any

play01:34

questions which are top of mine feel

play01:36

free to put them in the zoom chat feel

play01:38

free to put them in the in the slack

play01:41

Channel and I'll make sure we kind of

play01:43

ask ask those as we go through this

play01:45

session as well uh but again thank you

play01:47

deani for joining us this morning um

play01:50

kind of standard question you know uh

play01:52

can you tell us the audience a little

play01:55

bit about what tide does um and and and

play01:58

your role at tide uh just to get us

play02:01

started sure so hi everybody my name is

play02:04

deani uh I am the senior product

play02:06

security engineer at tide TI is

play02:08

basically a leading provider for digital

play02:11

business banking uh we are a mobile

play02:13

first company where uh we provide

play02:16

business accounts to small and

play02:17

mediumsized businesses and uh instantly

play02:21

like people can open their account and

play02:23

you know get a lot of financial services

play02:24

in buildt so we are a global company we

play02:28

have uh our mark in UK India and we are

play02:31

rolling out uh slowly in the new markets

play02:34

as well uh apart from that uh my role at

play02:38

TI basically whatever is security is my

play02:41

role at TI uh we majorly focus on

play02:44

providing like secure sdlc model at tide

play02:48

making sure that we Empower our

play02:50

developers to you know uh shift left and

play02:54

making sure that they understand

play02:56

security and try to make their decision

play02:59

you know more and more secure so

play03:01

basically it's more of engineering

play03:03

empowerment rather than us you know

play03:05

enabling it and making sure that our

play03:07

developers understand security they can

play03:09

you know constantly reach out to us

play03:11

regarding anything and take the security

play03:13

decisions on their

play03:15

end love that and you know kind of that

play03:18

just that whole model and mindset of

play03:20

collaboration as opposed to

play03:22

confrontation of more carrots and less

play03:25

sticks love that and what I have seen

play03:27

working with customers is the more you

play03:30

take that methodology of collaboration

play03:33

the more successful it would be and just

play03:35

kind of at a high level you know um I

play03:37

always like asking this question we work

play03:39

with lots of different customers Fortune

play03:41

500s fex

play03:44

retail uh from a tide perspective you

play03:47

know your team from a security side what

play03:50

is the m h how does your team uh align

play03:54

or what are the main goals of your team

play03:58

in making making tide as is a business

play04:01

successful so our team mostly works on

play04:04

making things secure basically we want

play04:07

to enable this particular principle like

play04:10

shift left from the designing phase to

play04:13

the development phase to making sure by

play04:15

the end of it we are secure in each and

play04:17

every step so as I mentioned regarding

play04:19

stlc model we will make sure that each

play04:20

and every step will have a security in

play04:22

place enabling like having different

play04:25

sort of risk assessments making sure we

play04:27

have the tools embedded like Dash sea

play04:30

Dash tools included in the built

play04:33

pipelines uh making it aware to our

play04:35

Engineers so that they can start using

play04:37

those

play04:38

tools is teaching them regarding you

play04:41

know educating them basically regarding

play04:43

all these tools and making sure that

play04:45

they understand it they fix the issues

play04:48

before it land UPS in production so we

play04:50

are more our major principle is

play04:52

empowering the engineers with uh

play04:55

thinking that we want to shift left

play04:58

brilliant no absolutely it's a great

play05:00

model of around hey how can we find

play05:02

things quicker earlier shift left

play05:06

uh now changing a little bit of gars so

play05:09

just for context for the audience I

play05:11

think tide became a sreb customer around

play05:14

10 months back or so beginning of the

play05:16

year um I want I would love for you to

play05:20

kind of

play05:21

share uh a little bit about you know

play05:25

when 10 months back when we started

play05:26

talking you know what kind of products

play05:29

were you looking for uh what were kind

play05:31

of some of the key things that you

play05:33

wanted in that uh in those products what

play05:35

were kind of some of the and we we'll

play05:38

unpack that's a loaded question so let's

play05:39

get started with you know where you were

play05:41

you know what kind of products were you

play05:42

looking at

play05:43

Etc so as at the back of our mind we'll

play05:47

always have this shift lift approach we

play05:50

will make sure that each and every

play05:52

particular you know process will have a

play05:55

security tool embedded and the major

play05:57

part when it comes to development of you

play06:00

know any of the projects uh we will

play06:02

always look into SCA SAS tools now uh

play06:05

being like a security driven company as

play06:08

well we always make sure that our

play06:10

pipelines and you know our whole

play06:13

infrastructure is secure uh with the

play06:15

code base being like the major uh place

play06:19

where it we want to make it more and

play06:20

more secure every day so then we looked

play06:23

into srep we were also like looking into

play06:26

different kind of tools and making sure

play06:28

that there are a lot of like uh

play06:30

competition regarding SC and SAS tools

play06:33

so what we were thinking of like when we

play06:37

ever choose a tool we not only choose

play06:39

like whether it can give you the best

play06:42

approach or not but we also choose it in

play06:44

a manner whether our Engineers will be

play06:47

able to use it whether it will be

play06:49

interesting and you know it will be more

play06:51

readable to the engineers whether they

play06:53

are able to you know grasp it and just

play06:55

make a quick you know fixes uh in uh

play06:58

when they are developing the whole thing

play07:00

so when it came to sreb the major

play07:02

advantages and I think we will get into

play07:05

more of it but the major advantages

play07:08

which we found out was that it is more

play07:10

easier for our developers to get into

play07:12

sem grip uh more easier for them to

play07:15

focus on the major parts which they need

play07:17

to focus on rather than the ones which

play07:18

they don't need to focus on and make a

play07:21

secure

play07:22

product brilliant now absolutely love

play07:26

that and I I think it's it's really

play07:27

interesting the one one thing that I

play07:29

remember even during our engagement back

play07:31

then and now

play07:33

is security teams are or absc teams are

play07:36

maybe 50% of the consumer at maximum

play07:39

maybe even lesser so you're actually

play07:42

making the decision on behalf of your

play07:45

developers uh and keeping that mindset

play07:47

and saying hey I'm not just looking for

play07:49

something which is easy for me but what

play07:51

would make it easy is brilliant so uh

play07:53

let's dive deeper into it and I know um

play07:56

one of the the the areas that you were

play07:59

really interested in was around reducing

play08:02

false positives and being able to kind

play08:04

of own the rules and being that was a

play08:07

gap that you had with some of the

play08:09

previous experiences um that tide had

play08:12

with vendors and do you want to talk a

play08:13

little bit about you know why was that

play08:16

an important uh talk a little bit about

play08:19

our custom rule capabilities and how how

play08:21

tide is using it so uh I'll break it

play08:25

down into two different aspects

play08:27

basically first is the sca part so uh

play08:30

for us uh the major thing is that we

play08:32

always want like all the high and

play08:35

critical issues not to wind up in

play08:37

production so we will make sure that you

play08:39

know we are blocking some of the

play08:41

pipelines at a point where we see any

play08:43

highend critical issues now when we were

play08:45

analyzing different tools we were making

play08:47

sure that you know what sort of tool our

play08:50

Engineers can use which will not give

play08:52

them false positive to you know block

play08:54

their work because if we start to you

play08:57

know use a tool which can block them in

play08:59

certain scenarios it becomes very hard

play09:01

to you know say that Engineers can use

play09:04

that tool and it's easier them for them

play09:06

to use it but when we were looking into

play09:08

Sam grab the I I think in our previous

play09:11

conversations also the major part which

play09:13

we wanted was uh making it less and less

play09:15

false positive so when you guys come up

play09:18

with the feature of reachability

play09:19

analysis it was the major selling point

play09:22

for us because at that point like we

play09:24

reduced I think 80% of the false

play09:27

positive capabilities so that was the

play09:30

major selling point for us just because

play09:32

now we can you know just go to the

play09:34

engineer saying that you are not getting

play09:36

any false positives it's all which is in

play09:38

the code it's reachable in the code you

play09:40

only have to deal with the things which

play09:42

are in your code rather than you know

play09:44

something which is going to uh some

play09:47

third party some open source where they

play09:49

don't have any control over so that was

play09:51

one of the major things for the sea part

play09:54

now coming to the SAS part like there

play09:56

are a lot of SAS Solutions out there it

play09:58

can can be open source it can be other

play10:00

things as well but again like we are as

play10:04

I mentioned we are more driving towards

play10:07

us easily you know uh getting to know

play10:10

the tool but it is more for our

play10:11

Engineers because they are the people

play10:14

who are more you know into that code we

play10:17

don't know the code we only know the o o

play10:19

overall scenario of what is going on

play10:22

okay this is happening this particular

play10:24

service is doing this thing but they are

play10:26

the daily users of those code and when

play10:30

it comes to custom rules it becomes

play10:32

easier for us because with the custom

play10:34

rules I think we created a lot of our

play10:37

own custom rules with the help of

play10:38

Engineers with the help of you know them

play10:40

taking a stand and creating their custom

play10:43

rules and I think whatever we have

play10:46

created it has given us a 100% positive

play10:48

result like making sure that we have

play10:51

like authentication in places in many of

play10:53

the services we making sure that you

play10:55

know there are there is no bypassing of

play10:58

some of the

play10:59

levels and everything so those custom

play11:02

rules came into the picture at that time

play11:04

when you know we we wanted to make sure

play11:06

that all our Engineers are understanding

play11:09

and uh they are actually creating the

play11:11

rules so always making sure that you

play11:14

know by the end of this we will not be

play11:16

the one who will be creating the rules

play11:18

they are the one and for that we have

play11:19

like different like we have a security

play11:22

Champions program where we you know tell

play11:24

them they get the first sight of

play11:26

everything basically in our company so

play11:28

whatever we are doing they are the

play11:30

people who are the first uh like looker

play11:32

of whatever the new tool is coming in

play11:34

whatever the new features are coming in

play11:36

and we will tell them why it is good and

play11:39

start to you know explain them and they

play11:41

making it uh more and more better for us

play11:45

so it is always like these two things

play11:48

when it came for Sam grab we were

play11:50

choosing Sam grab and these two things

play11:52

came into the picture and that was the

play11:54

major thing why we choose SRE also

play11:57

that's an amazing amazing answer the

play11:59

thing I liked about this deani also for

play12:01

our audience here is which is very

play12:02

technical is it's kind of did in that

play12:04

technical thing but lots to unpack there

play12:07

so I'm going to maybe start off on the

play12:10

uh supply chain side so for the people

play12:12

in the audience who are not familiar

play12:14

with reachability analysis that's

play12:15

something we're going to cover in the

play12:17

work virtual in the Hands-On lab but

play12:19

essentially what we do there is we will

play12:22

actually check if that specific third

play12:24

party um or or third party package that

play12:28

you're using

play12:29

is being used as part of your source

play12:31

code

play12:35

not and we yeah um so that's on the

play12:40

reachability analysis side and that's

play12:41

where I think deani said uh 80%

play12:44

reduction in false positive that's

play12:45

that's actually really really amazing um

play12:49

uh the other side that we talked about

play12:51

so let's unpack a little bit on the um

play12:54

on the security Champions and the custom

play12:58

rule writing site deani so um I think

play13:02

most of the audience here should be

play13:03

familiar with uh the fact that with Sam

play13:06

um our rules are very transparent you

play13:08

can actually see what's happening but

play13:11

what was really interesting for me two

play13:13

things that stood out one was a 100% fix

play13:16

rate so what that means is if diani or

play13:20

if samre shows a uh a vulnerability to a

play13:24

developer for these custom rules 100% of

play13:27

those get fixed which means

play13:29

0% false positives and I think that's an

play13:32

amazing one but you know and and can you

play13:34

talk a little bit about this security

play13:36

Champions program how are you guys

play13:39

getting your teams to write this any

play13:42

tips and tricks for the teams here cuz I

play13:44

think um all of us especially are trying

play13:47

to collaborate with our engineers and

play13:49

anything that you guys did which really

play13:51

helped them grasp of course writing

play13:53

rules is easy for us but anything that

play13:54

you guys did there that really made that

play13:57

successful and getting them to write

play13:58

would be I think really useful for the

play14:00

team to uh for the audience to listen

play14:03

sure so uh mostly at tight what we

play14:06

majorly do as a proect team is we we

play14:09

will always perform threat modeling

play14:10

sessions and the threat modeling

play14:12

sessions will always cover the

play14:14

developers even the security Champions

play14:16

we have given a lot of sessions to them

play14:18

as well and when you provide them with

play14:21

these insights they will always have

play14:23

this thing in mind can I automate

play14:25

something can I automate you know making

play14:28

sure that these security uh features uh

play14:31

you know are enabled and don't end up in

play14:34

a bad state so when we started to do

play14:37

this and we started to communicate with

play14:39

each and every one of them uh we like

play14:42

the whole team actually performed a very

play14:44

well job in communicating these things

play14:46

to you know every owner of every product

play14:50

and uh with that this automation thing

play14:52

came comes into the picture so uh they

play14:55

were more interested in knowing that how

play14:57

can we include it in our pipelines and

play14:59

how can we you know make our own rules

play15:02

uh either it is you know in Java either

play15:04

it is in Python either it is in

play15:05

terraform or any other language which

play15:07

they want to use to make sure that you

play15:09

know these uh don't end up because

play15:12

sometimes like after the whole process

play15:14

when the product is buil they will get a

play15:16

vulnerability for on that their name

play15:18

saying that oh you have have not done

play15:21

this thing or with the security

play15:23

Champions people saying that okay why we

play15:25

do have this vulnerability can't we you

play15:26

know just get rid of it so so when these

play15:29

things comes they started to you know

play15:32

contact us they started to understand

play15:34

like how these custom rules can be

play15:36

created and started to build these

play15:38

things with us it's not like all the

play15:41

engineers are doing it on their own but

play15:42

started to build these rules with us

play15:44

having a conversation having a

play15:46

discussion with us and then ending up in

play15:49

a manner that now we are at a state that

play15:53

those custom rules which we have created

play15:55

have a fixed rate of 100% so people

play15:58

people have started to you know grasp

play16:00

that knowledge even with the threat

play16:01

modeling session we will always tell

play16:03

them that you know if you want to

play16:04

automate this you can just use Sam GP on

play16:07

this one we can let you know how the

play16:09

custom rules are created we can do all

play16:11

these things so those kind of

play16:13

conversations when you put it in their

play16:15

mind that something can be automated

play16:16

something can be you know made better

play16:19

they will always choose that over

play16:21

getting you know a vulnerability issue

play16:23

on their

play16:24

name no absolutely I I love that and

play16:27

it's again a couple of key things here

play16:29

um I know in the industry there's

play16:31

there's a lot of talk now about secure

play16:34

defaults so hey how can we just check

play16:36

for automate the checks for these secure

play16:38

defaults and that's what you guys have

play16:40

actually implemented in practice at

play16:43

scale across all of Tide so it's it's

play16:45

really really brilliant um and the

play16:47

second thing is right if you enable your

play16:49

developers you know they want to do the

play16:51

right thing nobody wants to see

play16:52

vulnerable code and uh that's kind of

play16:54

the adoption um now I can also hear lots

play16:58

of uh teams here saying oh you know I'm

play17:00

one absc guy or we have a ratio one is

play17:03

to 50 for absc two devs and custom rules

play17:07

am I just creating lots of workload for

play17:09

myself have I would I be the one who's

play17:11

kind of writing these rules how have you

play17:14

looked at scaling that out and I know

play17:16

there'll be a little bit more work for

play17:17

you but have you guys gotten to a point

play17:19

where you're getting to a self-service

play17:21

through the security Champions can you

play17:22

talk a little bit about that just so

play17:23

that you know the people can see how

play17:25

it's been scaled um across your

play17:27

organization um yeah yeah so mostly what

play17:31

we do on these instances is when it

play17:33

comes to like creating their custom

play17:35

rules uh Engineers want to do things

play17:38

themselves if we try to you know add

play17:41

some things in their pipelines without

play17:43

even letting them know it will create a

play17:45

little bit of discomfort because it's

play17:48

their repo it's their particular you

play17:50

know personal project so they love the

play17:52

code they are writing so what we do is

play17:55

we we have provided them with the samre

play17:58

UI we have told them whatever you guys

play18:00

want to do you can do in that whatever

play18:02

you are trying to achieve with

play18:04

automation you can do that with the like

play18:07

because I think at TI we are like one to

play18:09

70 Engineers as in one app engineer or

play18:12

proad engineer for 70 engineers and uh

play18:15

we have a security Champion program

play18:17

which is like good established we try to

play18:19

tell them regarding okay this is good

play18:21

and with those people we try to cover

play18:24

more and more and more audience so that

play18:27

people can understand why it is

play18:28

important and it will be their job to

play18:31

you know make this automation make sure

play18:34

that they are you know uh like tuning it

play18:37

down tuning the rules tuning it like in

play18:40

a way that they want to do rather than

play18:41

us doing it because if we start to do it

play18:43

we will do it in a manner that it will

play18:45

start to block stuff but they want to

play18:47

monitor stuff they want to see like how

play18:48

it is working out first and then start

play18:51

to you know block the thing so it

play18:54

creates like a environment Plus at tide

play18:57

we always believe in like security

play18:58

education we will always want them to

play19:01

educate regarding okay what is s so we

play19:03

will have a full communication to the

play19:06

whole business regarding okay this is

play19:07

the new thing which we are coming up

play19:09

with if you have any questions just let

play19:11

us know there will be good pages

play19:12

regarding you know how this can be done

play19:15

how you can automate stuff with your own

play19:17

thing how you can create these rules so

play19:19

many people reach out to us individually

play19:21

asking us like what is this what it is

play19:24

about uh with the new features also if

play19:26

they see any new features in Sam CP or

play19:29

any other tool they will always reach

play19:30

out to us saying that how can I enable

play19:32

it in our

play19:34

system that's brilliant that's brilliant

play19:36

I love that I love the concept of hey

play19:38

this is not my absc tool you're

play19:40

democratizing it for your developers

play19:42

because finally in order for tide to get

play19:45

benefit from it the developers need to

play19:46

use it and I love the collaboration the

play19:48

way you kind of you know disseminating

play19:50

the knowledge there um talking of new

play19:53

features there's a couple of new

play19:55

interesting things that semrep has

play19:57

launched over the last six months so one

play20:00

of them was the AI capabilities which we

play20:04

call samre assistant the other one is

play20:06

we' introduced lots of different ID

play20:08

Integrations for vs code um jetbrains

play20:12

products like intellig py Cham

play20:14

Etc um where is tied in that Journey are

play20:18

you guys and you know maybe personally

play20:20

yourself how you're using it as well as

play20:22

the adoption with with with some of the

play20:25

some of the teams as well yeah so uh uh

play20:28

I feel like that grip is fast growing to

play20:31

be honest with all these features and uh

play20:34

specifically with AI we are very keen to

play20:36

get AI integrated it's just that we need

play20:38

to you know pass some processes at TI to

play20:41

get it integrated but personally because

play20:44

I do have a personal you know my it up

play20:46

my zreb account as well where I do the

play20:49

scans and I love the fact that how AI

play20:51

works because it's just like

play20:54

communicating getting the answers on the

play20:56

go rather than you know us

play21:02

sorry about that worri uh rather than

play21:05

you know when somebody's raising a PR

play21:08

they'll just get like a SRE board saying

play21:10

that oh you have done this mistake or

play21:11

you have you know got a vulnerable

play21:14

function here but people don't

play21:16

understand even though like you guys

play21:18

give a good description people sometimes

play21:20

don't understand like why it is

play21:22

vulnerable what will happen with that so

play21:25

with the AI enabled assistance you can

play21:27

actually you know communicates with

play21:29

somebody rather than Googling it

play21:31

separately oh how this can work you know

play21:33

going through a lot of pages you can

play21:35

just talk to AI saying how it can be

play21:37

vulnerable uh how can I protect it

play21:39

what's the remediation about it and

play21:41

people just get the answer on the go

play21:43

rather than you know working sitting

play21:45

back okay I'll you know Google searches

play21:47

maybe next time just because I am in a

play21:49

hurry to launch this to production right

play21:51

now right so those kind of things I

play21:54

guess and I love the feature because it

play21:56

gives me good remediation answers on on

play21:58

the go and I can again change my code at

play22:01

that point raise another PR and that's

play22:03

gone so those are major factors which I

play22:06

like about it the other thing is uh with

play22:09

the new approaches like ID as I

play22:12

mentioned our developers are very keen

play22:14

to know about new things so I think one

play22:17

of the developers at I like reached out

play22:19

to me saying that okay srip is an ID how

play22:22

should I use it how can I use it so now

play22:25

we are like trying to get it embedded in

play22:27

the idees asking everybody to how you

play22:29

can embed it uh because there are a lot

play22:31

of ID so it will again shift left from

play22:34

the beginning itself even not in GitHub

play22:36

or git lab or bit bucket even in the

play22:39

beginning when they are actually

play22:40

developing the code they can just get

play22:41

these things done right so those are

play22:44

kind of things like where Sam grip is

play22:46

like winning a lot of Hearts of

play22:48

everybody okay and plus uh the third

play22:51

thing which came out very recently

play22:53

secret scanning and I think uh that is

play22:56

something which we need to look at in

play22:58

into the future because uh we have seen

play23:00

a lot of Secrets being disclosed in

play23:03

different different even in open source

play23:04

projects there are a lot of Secrets

play23:06

which can be disclosed right so uh srep

play23:09

is like giving out those things uh

play23:12

specifically uh the way like there also

play23:15

the major thing is reduction of false

play23:17

positive because srep came to this

play23:20

approach by making sure that secrets are

play23:22

not disclosed in a manner that no they

play23:25

are deactivated why because this check

play23:28

whether those are active Secrets or not

play23:30

so that is the major thing which I think

play23:32

srep is winning over any other Tool uh

play23:35

right now because that will give

play23:38

everyone a time to only work on the

play23:41

things which they care about if it is

play23:43

deactivated they might not care about it

play23:45

they'll just say that it's deactivated

play23:47

it's like one year ago something came up

play23:49

and now we have rotated everything why

play23:51

it is showing us there so it's more and

play23:54

more of that Progressive approach where

play23:57

you guys are making sure sure that you

play23:58

know less false positive less making uh

play24:01

Engineers Drive crazy regarding oh I

play24:03

don't need to fix this thing I just want

play24:05

to make sure that you know I'm fixing

play24:07

the things which are important to me so

play24:09

I think those are the kind of things

play24:11

that srep is winning over and in future

play24:13

I am very keen to get these

play24:16

integrated brilliant love that love that

play24:20

um always very exciting for me to hear

play24:24

when a developer comes to appsc and says

play24:26

give me more security ity and that kind

play24:29

of talks to the the capabilities of the

play24:32

product around you know reducing those

play24:34

false positives reducing the friction

play24:36

enabling those developers and the

play24:38

approach deani you and your team uh at

play24:40

tide have taken in in that uh

play24:44

collaboration um just checking are there

play24:47

any questions Raj uh on the chat or

play24:51

anything else we might have time for

play24:52

maybe one or two questions before we let

play24:54

deani go I think we're kind of running a

play24:56

little bit behind but uh uh if not we'll

play24:59

maybe uh no I don't see any

play25:03

questions brilliant no thank you so much

play25:05

deani really appreciate your time uh

play25:08

please give deani a big round of

play25:09

applause uh for joining us um today and

play25:13

uh yeah uh you're happy to stay with us

play25:17

for the rest of the session if you want

play25:19

uh but I'm I think you you'd be able to

play25:21

deliver the session then go through it

play25:23

so uh but thank you again I really

play25:26

appreciate it thanks a lot for inviting

play25:29

but yeah thank you so much I have other

play25:31

meetings to do so yeah I'll jump off now

play25:33

but thank you so much for

play25:36

[Music]

play25:38

inviting

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
Product SecuritySDLCDeveloper EmpowermentCybersecurityWeb ApplicationsMobile SecuritySecurity FrameworksTide FinancialsShift LeftCustom Rules
Besoin d'un résumé en anglais ?