DevSecOps Interview Question Flashcards
What tool do you use for SAST
Fortify or Checkmarx SAST
Sonar
Synk
What is SAST tools
Static Application Security Testing (SAST tool)
What are SCA tools
Software Composition Analysis (SCA) tools play very important role.
SCA tools help organizations identify and mitigate security vulnerabilities and licensing issues in their software by analyzing third-party components and dependencies.
What difference between SCA and SAST tools
SCA is used to identify open source dependencies. SAST is used to analyze proprietary or first-party code. SAST tools do require access to source code, while SCA tools may not. SCA supports open source license compliance and SBOM use cases, while SAST does not.
What are SCA tools available
Synk
JFrog XRay
GitHub dependabot
Fossa
What are IAST tools
IAST (interactive application security testing) analyzes code for security vulnerabilities while the app is run by an automated test, human tester, or any activity “interacting” with the application functionality.
What are example of IAST tools
IAST Tools
Contrast Assess: This tool provides real-time identification and tracking of vulnerabilities during the software development process. It integrates seamlessly into CI/CD pipelines for continuous monitoring and protection.
Invicti: Known for its web application scanning capabilities, Invicti includes IAST features that allow for real-time vulnerability detection and reporting.
HCL AppScan: This comprehensive tool combines IAST with other testing methods, offering extensive support for various programming languages and frameworks. It also has DAST capabilities
Synopsys Seeker: This IAST tool focuses on providing detailed insights into vulnerabilities while the application is running, supporting multiple programming languages.
Acunetix: This web application security tool features IAST capabilities, enabling real-time detection of vulnerabilities and integration into automated testing workflows. It also has DAST capabilities
What are DAST tools
Dynamic application security testing (DAST) technologies are designed to detect conditions indicative of a security vulnerability in an application in its running state.
Opt for DAST when assessing production applications from an external perspective or when source code access is not available.
Give example of DAST tools
Netsparker, Burp Suite Enterprise, OWASP ZAP