You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/en/about_defectdojo/examples_of_use.md
+33-34Lines changed: 33 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,24 @@
1
1
---
2
-
title: "💡 Common Use-Cases"
2
+
title: "💡 Common UseCases"
3
3
description: "Use Cases and examples"
4
4
draft: "false"
5
5
weight: 2
6
6
chapter: true
7
7
---
8
8
9
-
This article is based on DefectDojo Inc's February 2025 Office Hours: "Tackling Common-Use Cases".
9
+
This article is based on DefectDojo Inc's February 2025 Office Hours: "Tackling CommonUse Cases".
10
10
<iframewidth="560"height="315"src="https://www.youtube.com/embed/44vv-KspHBs?si=ilRBlfo-wvX5DPVg"title="YouTube video player"frameborder="0"allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share"referrerpolicy="strict-origin-when-cross-origin"allowfullscreen></iframe>
11
11
12
-
## Examples of Use-Cases
12
+
## Examples of UseCases
13
13
14
-
DefectDojo is designed handle any security implementation: no matter your security team size, IT complexity level, or reporting volume. These stories are intended as jumping-off points for your own needs, but they're based on real examples from our community and DefectDojo Pro team.
14
+
DefectDojo is designed to handle any security implementation, no matter your security team size, IT complexity level, or reporting volume. The following stories are intended as jumping-off points for your own needs, but they’re based on real examples from our community and the DefectDojo Pro team.
15
15
16
16
### Large Enterprise: RBAC and Engagements
17
17
18
-
'BigCorp' is a large multinational enterprise, with a CISO and a centralized IC security group that includes AppSec.
19
18
20
-
Security at BICORP is highly centralized. Certain things are delegated out to BISOs (Business Information Security Officers).
19
+
‘BigCorp’ is a large multinational enterprise, with a Chief Information Security Officer (CISO) and a centralized IT security group that includes AppSec.
20
+
21
+
Security at BigCorp is highly centralized. Certain things are delegated out to Business Information Security Officers (BISO).
21
22
22
23
The key concerns for BigCorp are:
23
24
@@ -32,26 +33,24 @@ BigCorp handles security data from many sources:
32
33
- Third-party Pen testing for certain Products
33
34
- PCI compliance auditing for certain Products
34
35
35
-
Each of these report categories can be handled by a separate Engagement, with a separate Test for each kind of test in DefectDojo.
36
+
Each of these report categories can be handled by a separate Engagement, with a separate Test for each kind of scan in DefectDojo.
- If a Product has a CI/CD pipeline, all of the results from that pipeline can be continuously imported into a single open-ended Engagement. Each tool used will create a separate Test within the 'CI/CD' Engagement, which can be continuously updated with new data.
40
+
- If a Product has a CI/CD pipeline, all of the results from that pipeline can be continually imported into a single open-ended Engagement. Each tool used will create a separate Test within the CI/CD Engagement, which can be continuously updated with new data.
40
41
(See our guide to [Reimport](/en/connecting_your_tools/import_scan_files/using_reimport/))
41
-
- Each Pen Test effort can have a separate Engagement created to contain all of the results: e.g. 'Q1 Pen Test 2024', 'Q2 Pen Test 2024', etc.
42
-
- BigCorp will likely want to run their own mock PCI Audit so that they're prepared for the real thing when it happens. The results of those audits can also be stored as a separate Engagement.
43
-
44
-
42
+
- Each Pen Test effort can have a separate Engagement created to contain all of the results: e.g. "Q1 Pen Test 2024," "Q2 Pen Test 2024," etc.
43
+
- BigCorp will likely want to run their own mock PCI audit so that they're prepared for the real thing. The results of those audits can also be stored as a separate Engagement.
45
44
46
45
#### RBAC Model
47
46
48
47
- Each BISO has Reader access assigned for each business unit (Product Type) that they're in charge of.
49
-
- Each Product Owner has Writer access for the Product that they're in charge of. Within their Product, these Product Owners can interact with DefectDojo - they can keep notes, set up [CI/CD pipelines](/en/connecting_your_tools/import_scan_files/api_pipeline_modelling/), create Risk Acceptances or use other features.
50
-
- Developers at BigCorp have no access to DefectDojo at all, and they don't need it - the Product Owner can push Jira tickets directly from DefectDojo which contain all of the relevant vulnerability information. The developers are already using Jira, so they don't have to track remediation any differently than a different development task.
48
+
- Each Product Owner has Writer access for the Product that they're in charge of. Within their Product, Product Owners can interact with DefectDojo by keeping notes, setting up [CI/CD pipelines](/en/connecting_your_tools/import_scan_files/api_pipeline_modelling/), creating Risk Acceptances and using other features.
49
+
- Developers at BigCorp have no access to DefectDojo at all, and they don't need it. The Product Owner can push Jira tickets directly from DefectDojo which contain all of the relevant vulnerability information. The developers are already using Jira, so they don't have to track remediation any differently than a different development task.
Cyber Robotics is a company that sells manufacturing hardware that comes with embedded software systems. They have a Chief Product Officer that oversees both their product and cybersecurity as a whole.
53
+
Cyber Robotics is a company that sells manufacturing hardware that comes with embedded software systems. They have a Chief Product Officer (CPO) that oversees both their product and cybersecurity as a whole.
55
54
56
55
Though they have less diverse security information to manage than BigCorp, it's still essential for them to properly contextualize their security information so that they can proactively respond to any significant Findings.
57
56
@@ -64,48 +63,48 @@ Key concerns for Cyber Robotics:
64
63
65
64
Cyber Robotics has a standardized testing process for all of their embedded systems:
66
65
67
-
- CI/CD, SAST, and SCA tests are run.
66
+
- CI/CD, SAST, and SCA tests are run
68
67
- Security Control Reviews
69
68
- Network Scans
70
69
- Third Party Code Review
71
70
72
-
However, because each version of their software is isolated, they'll inevitably have a lot of data to organize, much of which is only useful in a single context (the particular version of the software they're running).
71
+
However, because each version of their software is isolated, they’ll inevitably have a lot of data to organize, much of which is only useful in a single context (i.e., the particular version of the software they’re running).
73
72
74
-
Cyber Robotics can solve this problem by using Product Types here to represent a single product line, and individual Products for each separate version. This will allow them to drill down to determine which Products are associated with a single vulnerability.
73
+
Cyber Robotics can solve this problem by using Product Types to represent a single product line, and individual Products for each separate version. This will allow them to drill down to determine which Products are associated with a single vulnerability.
Assigning software versions to Products, rather than Engagements allows Cyber Robotics to limit access to a particular software version, if necessary. Field technicians and Support staff can be granted access to a single version of the software without having to give them access to the entire product line.
77
+
Assigning software versions to Products, rather than Engagements, allows Cyber Robotics to limit access to a particular software version, if necessary. Field technicians and Support staff can be granted access to a single version of the software without having to give them access to the entire product line.
79
78
80
79
#### RBAC Model
81
80
82
81
The AppSec team here has Global Roles assigned that govern their level of interaction.
83
82
84
-
- The Chief Product Officer has Global Reader access to DefectDojo, as with the CISO in BigCorp.
83
+
- The CPO has Global Reader access to DefectDojo, as with the CISO in BigCorp.
85
84
- Individual Product Owners have Global Reader access to any Product in DefectDojo, as well as Writer access to the Product that they own.
86
85
87
86
On the Support side:
88
87
89
-
- Support Personnel are temporarily granted Reader access to specific Products that they're assigned to maintain, but they do not have access to all DefectDojo data.
88
+
- Support personnel are temporarily granted Reader access to specific Products that they're assigned to maintain, but they do not have access to all DefectDojo data.
90
89
91
90
### Dynamic IT environments and microservices: Cloud Services company
92
91
93
92
Kate's Cloud Service operates a rapidly changing environment that uses Kubernetes, microservices, and automation. Kate's Cloud Service has a VP of Cloud that oversees Cloud Security issues. They also have a CISO who manages the software development on offer, but for this example we will focus specifically on their Cloud security concerns.
94
93
95
-
Kate's Cloud Service has fully automated all of their reporting, and ingests data into DefectDojo as soon as reports are produced.
94
+
Kate's Cloud Service has fully automated all of their reporting and ingests data into DefectDojo as soon as reports are produced.
96
95
97
96
Key Concerns for Kate's Cloud Service:
98
97
99
-
-managing multi-tenant cloud security, preventing cross-customer interaction while enabling shared service delivery
100
-
-handling rapid changes in their cloud environment
98
+
-Managing multi-tenant cloud security, preventing cross-customer interaction while enabling shared service delivery.
99
+
-Handling rapid changes in their cloud environment.
101
100
102
101
#### Tagging Shared Services
103
102
104
-
Because Kate's model contains many shared services that can impact other Products, the team [Tags](/en/working_with_findings/organizing_engagements_tests/tagging_objects/)the results to indicate which cloud offerings rely on those services. This allows any issues with shared services to be traced back to the relevant teams, and reports in DefectDojo. Each of these Shared Services are in a single Product Type that separates them from the main Cloud offerings.
103
+
Because Kate's model contains many shared services that can impact other Products, the team [Tags](/en/working_with_findings/organizing_engagements_tests/tagging_objects/)their Products to indicate which cloud offerings rely on those services. This allows any issues with shared services to be filtered across Products and reported to the relevant teams. Each of these shared services are in a single Product Type that separates them from the main cloud offerings.
Because the company is rapidly growing, with frequently changing tech leads, Kate can use Tags to track which tech lead is currently responsible for each cloud product, avoiding the need for constant manual updates to their DefectDojo system. These Tech Lead associations are tracked by a service that's external to DefectDojo and can govern the import pipelines or call the DefectDojo API.
107
+
Because the company is rapidly growing and tech leads are changing frequently, Kate can use Tags to track which tech lead is currently responsible for each cloud product, avoiding the need for constant manual updates to their DefectDojo system. These tech lead associations are tracked by a service that’s external to DefectDojo and can govern the import pipelines or call the DefectDojo API.
109
108
110
109
For more information on Tagging, see our guide to [Tags](/en/working_with_findings/organizing_engagements_tests/tagging_objects/).
111
110
@@ -118,30 +117,30 @@ On the Security/Compliance side:
118
117
119
118
On the development side:
120
119
121
-
- Tech Leads for each specific cloud product (e.g., compute, storage, shared services) have **Maintainer access** to their assigned Product, to triage the security results related to their specific cloud product offering. They can review Findings and take action within their Product, and can also reorganize their Finding data significantly.
120
+
- Tech Leads for each specific cloud product (e.g., compute, storage, shared services) have **Maintainer access** to their assigned Product in order to triage the security results related to their specific cloud product offering. They can review Findings and take action within their Product and can also reorganize their Finding data significantly.
122
121
- Developers working on specific Products are given **Writer Access** to the Product they're working on, enabling them to comment on Findings, request Peer Reviews, and create Risk Acceptances.
123
122
124
123
### Onboarding New Acquisitions: SaaSy Software
125
124
126
-
SaaSy software is a rapidly growing firm which frequently acquires other software companies. Every time a new company is acquired, the Director Of Quality engineering and the AppSec team is suddenly in charge of many new code repos, developers and processes. Their DefectDojo model ensures that they can get up to speed as soon as possible.
125
+
SaaSy software is a rapidly growing firm which frequently acquires other software companies. Every time a new company is acquired, the Director Of Quality engineering and the AppSec team is suddenly in charge of many new code repos, developers, and processes. Their DefectDojo model ensures that they can get up to speed as soon as possible.
127
126
128
127
Key Concerns for SaaSy Software:
129
128
130
-
-avoiding public security issues while maintaining compliance programs (such as SOC2)
131
-
-ability to confidently onboard tools and processes from new products
132
-
-ability to report and categorize vulnerabilities on both in-production and in-development branches
129
+
-Avoiding public security issues while maintaining compliance programs (such as SOC2).
130
+
-Ability to confidently onboard tools and processes from new products.
131
+
-Ability to report and categorize vulnerabilities on both in-production and in-development branches.
133
132
134
133
#### Testing Model
135
134
136
-
Testing at SaaSy is focused on broad strokes rather than standardized tool use, since each acquisition comes with their own tools and processes for AppSec. SaaSy needs to perform both internal assessments (CI/CD, DAST, Container scans, Threat Modeling) and external assessments (3rd party Pen Tests, Compliance audits.)
135
+
Testing at SaaSy is focused on broad strokes rather than standardized tool use, since each acquisition comes with their own tools and processes for AppSec. SaaSy needs to perform both internal assessments (CI/CD, DAST, container scans, and threat modeling) and external assessments (Third party pen tests, compliance audits).
137
136
138
-
To assist with onboarding new applications, SaaSy software has a standard approach to their data model. Each time SaaSy onboards a new application, they create a new Product Type for that app, and create sub-products for the repositories that make it up; (Front-End, Backend API, etc.)
137
+
To assist with onboarding new applications, SaaSy software has a standard approach to their data model: each time SaaSy onboards a new application, they create a new Product Type for that app, and create sub-products for the repositories that make it up (Front-End, Backend API, etc).
Each of these Products is further subdivided into Engagements, one for the main branch and one for each branch of development. Tests within these Engagements are used to categorize the testing efforts. Development branches have separate Tests which store the results of CI/CD and SCA scans. The Main branch has those as well, but also adds Tests which store Manual Code Review and Threat Model reports.
143
142
144
-
All of these Tests are open-ended and can be updated on a regular basis using Reimport. Deduplication is only handled at the Engagement level, which prevents Findings in one Code branch from closing Findings in another.
143
+
All of these Tests are open-ended and can be updated on a regular basis using Reimport. [Deduplication](/en/working_with_findings/finding_deduplication/about_deduplication/) is only handled at the Engagement level, which prevents Findings in one Code branch from closing Findings in another.
145
144
146
145
By applying this model consistently, SaaSy has a model that they can apply to any new software acquisition, and the AppSec team can quickly begin monitoring the data to ensure compliance.
0 commit comments