How Can Mid-Sized SaaS Teams Improve AppSec Processes in EKS?

0
17
Asked By Techie42 On

I'm part of a 40-person SaaS team that mainly consists of engineers, and we're primarily using AWS EKS alongside GitHub Actions and ArgoCD. As we've grown from a startup to a more enterprise-like company, our application security (AppSec) needs have become increasingly complex and overwhelming. Right now, we manage around 130 microservices across three EKS clusters. While our Software Composition Analysis (SCA) in pull requests is functioning reasonably well, our Dynamic Application Security Testing (DAST) and Interactive Application Security Testing (IAST) lack organization and consistency. Scanning seems to happen at random intervals, and we struggle to adapt our practices—especially with so few team members focusing on security. With NodeJS and Go apps, we're frequently facing issues related to the OWASP Top 10. Maintaining a shift-left approach feels impossible with just me and another part-time developer advocate addressing the alerts. Moreover, our monorepo setup complicates matters further. We're also under pressure for compliance with SOC2 and PCI, meaning we can't overlook runtime or Infrastructure as Code (IaC) vulnerabilities. I'm interested in learning how other mid-sized teams effectively manage their AppSec, particularly in terms of adopting custom policies, utilizing Slack bots for triaging alerts, and finding effective EKS strategies for preventing high-risk deployments without slowing down our workflow. Despite trying out various resources, nothing has seemed applicable to our specific environment.

5 Answers

Answered By SecurityGuru92 On

Automated gating could be a game changer for you. Not every pull request needs a comprehensive scan; instead, set up GitHub Actions and ArgoCD policies to automatically block deployments that contain serious security issues, like high-severity OWASP findings. It really reduces the cognitive load on your team. Start with critical microservices and expand your coverage over time.

Answered By CodeSlinger On

Incorporating security into your workflow is vital. Consider hiring an SRE, and you might need someone to address the complexities caused by microservices. Sometimes simplifying the architecture can lead to better security practices overall.

Answered By AppSecWizard On

Scaling DAST and IAST is tough without proper orchestration. Some teams run these scans on less busy branches or during off-peak hours. Then, they funnel only the most actionable alerts to platforms like Slack, helping ensure that the alerts don’t get ignored.

Answered By DevSecOpsNinja On

With that many microservices and a small team, prioritization is key. You can't scan everything equally, so tier your services based on their internet exposure and data sensitivity. Focus DAST on critical services that deal with PCI data. For runtime security, you might want to implement tools like Falco for threat detection and Trivy Operator for image scanning. These can help manage vulnerabilities more effectively within your clusters without adding extra layers of infrastructure. If SCA works well in your pull requests, consider extending that to include Semgrep for SAST—you can create custom rules that fit your codebase and run it without much disruption.

Answered By CloudSecurityAce On

In our similarly-sized organization, we recently adopted a subscription to Wiz. We manage our policies and temporary ignore rules using a Terraform repository. We scan our base images daily, and if any issues arise, our on-call person can add ignores to Terraform to allow necessary releases. Developers can create temporary ignores specific to their applications, controlled through pull requests and code owners. We also run checks for secrets and SAST with VCS hooks during pull events.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.