youtube image
From YouTube: Abusing CI/CD - Top Ways to Reach Production - Omer Gil, Cider Security

Description

For more Continuous Delivery Foundation content, check out our blog: https://cd.foundation/blog/

Abusing CI/CD - Top Ways to Reach Production - Omer Gil, Cider Security

CI/CD pipelines are becoming one of the most exploited paths into internal and production systems by attackers, as there are a growing number of vectors that can be manipulated to gain access that are often times still left completely exposed, despite being well-known. From unexpected webhooks requests, to bypassing branch protection rules, through more complex attack scenarios like Poisoned Pipeline Execution - attackers have found that CI/CD is a quick way to invoke malicious attacks on production code. This talk will walk you through common attack vectors in CI/CD pipelines - ones you’re probably aware of, and ones that require more attention and research, and some of the ways you can harden your systems to prevent unwanted access to your sensitive internal data. Real-world attack scenarios will be showcased as part of the session.