Milecia McGregor
Securing Your Web Application Pipeline From Intruders
#1about 4 minutes
Establishing foundational CI/CD best practices
Following key principles like small build sizes, environment parity, and local testing creates a reliable foundation before adding security layers.
#2about 5 minutes
Why developers often overlook CI/CD security
Developers often neglect pipeline security due to time constraints, conflicting priorities, and general unfamiliarity with CI/CD configuration languages like YAML.
#3about 5 minutes
Understanding common intruder attack vectors
Intruders exploit vulnerabilities by using open-source tools, finding misconfigurations, scanning for open ports, and leveraging known package security flaws.
#4about 3 minutes
Integrating automated security tools in the build phase
Use Static Application Security Testing (SAST) tools like OWASP Dependency-Check and Snyk to scan for package vulnerabilities early in the build process.
#5about 5 minutes
Applying security tools in test and delivery phases
Leverage DAST tools like OWASP ZAP in the test phase and compliance tools like Chef InSpec in the delivery phase to catch dynamic vulnerabilities.
#6about 2 minutes
Securing applications in the production environment
Utilize bug bounty programs like HackerOne and Bugcrowd for continuous security testing in production, but use automated tools with caution to avoid impacting performance.
#7about 7 minutes
Essential manual security practices for your pipeline
Implement crucial security habits such as managing user permissions, closing unused ports, encrypting all data, and regularly checking against the OWASP Top 10.
#8about 7 minutes
Code examples for integrating security scans
See practical examples of how to add a Snyk security scan step into the configuration files for CircleCI, Conductor, and Travis CI.
#9about 3 minutes
Key takeaways for securing your application pipeline
Prioritize keeping secrets out of version control, routinely audit CI/CD configurations, patch known vulnerabilities promptly, and explore attacker tools to improve your defenses.
Related jobs
Jobs that call for the skills explored in this talk.
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
Matching moments
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
02:48 MIN
Building trust through honest developer advocacy
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
05:32 MIN
Getting hired by contributing to open source projects
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
14:14 MIN
Scripting presentations and demos in VS Code
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
11:32 MIN
The industry's focus on frameworks over web fundamentals
WeAreDevelopers LIVE – Frontend Inspirations, Web Standards and more
Featured Partners
Related Videos
Enabling automated 1-click customer deployments with built-in quality and security
Christoph Ruggenthaler
Real-World Security for Busy Developers
Kevin Lewis
What The Hack is Web App Sec?
Jackie
DevSecOps: Injecting Security into Mobile CI/CD Pipelines
Moataz Nabil
Walking into the era of Supply Chain Risks
Vandana Verma
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Practical tips and tricks for CI/CD success
Zan Markan
Why Security-First Development Helps You Ship Better Software Faster
Michael Wildpaner
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Siemens AG
Berlin, Germany
C++
GIT
CMake
Linux
DevOps
+7




Integrity360
PHP
C++
Java
Unix
Ruby
+5

Onintigritissecurity
Remote
Splunk
Network Security



Spektrum
Remote
Intermediate
Azure
Scrum
Gitlab
Docker
+13