Skip to content
View hariohm's full-sized avatar

Block or report hariohm

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
hariohm/README.md

๐Ÿ‘‹ Hi, Iโ€™m @hariohm
๐Ÿ‘€ Iโ€™m interested in penetration testing, threat hunting, and red teaming.
๐ŸŒฑ Iโ€™m currently learning bug bounty techniques and advanced security research.
๐Ÿ’ผ My expertise includes web app security, subdomain enumeration, vulnerability scanning, and manual exploitation.
๐Ÿ”ง Tools I use: Burp Suite, Nessus, OWASP Zap, Nuclei, httpx, ffuf, WPScan, Shodan, Retire.js, and more.
๐Ÿ“Š I also work with Wappalyzer, SecLists, PayloadsAllTheThings, and build Nuclei dashboards for vulnerability tracking.
๐Ÿ“ซ How to reach me: [email protected] or via LinkedIn

My DevSecOps & Product Security Journey ๐Ÿš€

As I started learning DevSecOps through various tutorials and blogs, I realized that a strong understanding of AWS is essential. You don't need to handle all DevOps tasks as a DevSecOps engineer, but you must understand how things workโ€”just like visiting a restaurant and knowing how to cook your own dish.

1๏ธโƒฃ AWS Security: Shared Responsibility Model & Hardening In most organizations, teams primarily use 15 to 20 AWS services, and security follows the shared responsibility model. Our focus is on securing AWS from our side, covering areas such as:

โœ… CSPM Tools: Auditing AWS configurations (e.g., ScoutSuite, Prowler, AWS Security Hub). โœ… EC2 Hardening: Regular security updates, closing unnecessary ports, disabling root login. โœ… Network Security: Configuring VPC, Security Groups, NACLs, WAF, Shield. โœ… AWS Monitoring: CloudTrail, CloudWatch, GuardDuty, Security Hub for log analysis & anomaly detection. โœ… Least Privilege Access: IAM security, role-based access control, and zero trust principles.

By implementing these, AWS resource security is covered 100%.

2๏ธโƒฃ DevSecOps: Security from Code to Deployment Security starts at the source code level, ensuring vulnerabilities are identified before production.

๐Ÿ”น SCM Security (GitHub/GitLab/Bitbucket):

SAST (Static Application Security Testing) โ†’ SonarQube, Semgrep, Trivy, Snyk, OWASP Dependency-Check SCA (Software Composition Analysis) โ†’ Identify insecure open-source dependencies DAST (Dynamic Analysis Security Testing) โ†’ Burp Suite, OWASP ZAP, Nessus Container Scanning โ†’ Trivy, Aqua, Anchore Infrastructure Scanning โ†’ Terraform IaC Security (Checkov, tfsec) ๐Ÿ’ก Question: Why should a security engineer learn SAST if itโ€™s a developerโ€™s job? โœ”๏ธ While DevOps can configure security tools, DevSecOps engineers ensure security rules are correctly enforced and help prioritize vulnerabilities.

3๏ธโƒฃ Why Security Engineers Need Cloud, Containers & DevOps Knowledge? To configure security in pipelines, a basic understanding of DevOps, AWS, and containerization is required.

Code to Container Process: Developer pushes code to GitHub/GitLab GitLab CI/CD pipeline triggers security scans If tests pass, the image is built & pushed to a registry The image is deployed to the cloud (AWS, Kubernetes, etc.) Thus, a DevSecOps engineer must understand: โœ”๏ธ How code moves from GitHub to production โœ”๏ธ How AWS services interact in a DevOps pipeline โœ”๏ธ How to secure cloud workloads, containers, and APIs

4๏ธโƒฃ Product Security & Application Security ๐Ÿ”น What is Application Security (AppSec)? It focuses on securing software from development to deployment:

Secure coding practices (OWASP Top 10) Threat modeling Code review & secure SDLC Secure authentication & authorization (OAuth, JWT) ๐Ÿ”น What is Product Security? Product Security goes beyond AppSec by ensuring end-to-end security of the product.

Web & API Security (DAST, API Pentesting) Mobile App Security (Android, iOS, OWASP MAS) Threat Modeling Secure software development lifecycle (SDLC) integration Incident Response & Security Posture Management ๐Ÿ’ก My Weakness: I struggle with writing YAML from scratch, but I can modify existing files. This is an area I want to improve.

5๏ธโƒฃ My Understanding So Far in DevSecOps & Product Security โœ… AWS Security & CSPM Tools (Security Hub, GuardDuty, IAM hardening) โœ… SCM Security & CI/CD Integration (SAST, DAST, SCA) โœ… Container & Infrastructure Security (Trivy, Checkov, Terraform Security) โœ… API Security & Web App Security โœ… Threat Modeling & Zero Trust Implementation ๐ŸŸก Needs Improvement: Writing YAML & Kubernetes security

๐Ÿ’ก SAST vs. DAST: โœ”๏ธ SAST is mostly handled by developers, and security engineers only review rules & prioritization. โœ”๏ธ DAST is an area where security engineers actively test for vulnerabilities.

Conclusion ๐Ÿ”น I have covered DevSecOps, AWS Security, and Product Security in depth. ๐Ÿ”น I understand infrastructure, CI/CD security, and application security. ๐Ÿ”น My focus now is improving API Security, Threat Modeling, and YAML writing.

๐Ÿ’ฌ What else should I learn to improve as a DevSecOps or Product Security Engineer?

Popular repositories Loading

  1. hariohm hariohm Public

    Config files for my GitHub profile.

    Python

  2. career career Public

    cyber security knowledge

  3. 100-days-of-python 100-days-of-python Public

  4. learngit learngit Public

    Python

  5. juice-shop juice-shop Public

    Forked from juice-shop/juice-shop

    OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

    TypeScript

  6. devsecops-full devsecops-full Public