Minimum Viable Security for Python Applications | David Melamed | Conf42 Python 2022

Conference: Conf42 Python 2022

Year: 2022

David Melamed Co-Founder & CTO at Jit The minimum viable security (MVS) approach, enables us to easily bake security into our config files, apps, and CI/CD processes with a few simple controls built for Python applications. In this talk we will focus on five critical security controls that will be integrated as part of the CI/CD pipeline: Bandit for static application security (SAST), Gitleaks to detect hard-coded or insufficiently secured secrets, Python dependency checks (SCA), infrastructure as code (IaC) and ZAP for API and dynamic application security (DAST), in addition to custom controls to ensure proper enforcement of MFA via Github Security. These controls will provide a foundational framework for securing Python applications, from the first line of code, that will make it possible to continuously iterate and evolve our security maturity, for advanced layers of security that often comes with time, as well as increased experience. Code examples will be showcased as part of this session. Other talks at this conference 🚀🪐 https://www.conf42.com​/python2022 — 0:00 Intro 0:24 Talk