From commit to compromise: How attackers exploit DevOps pipeline

Thursday
 
28
 
November
1:50 pm
 - 
2:30 pm

Speakers

Adela Ramadhina

Adela Ramadhina

Offensive Cyber Security Consultant
Irradiate Security

Synopsis

Are your DevOps practices truly secure? Think your CI/CD is impenetrable? Curious about the vulnerabilities lurking in your development and deployment processes that you might have overlooked? What if an attacker could turn your own tools against you, compromising your entire organisational pipeline and delivery chain?

This presentation explores the often-underestimated vulnerabilities within DevOps environments, demonstrating how attackers can exploit unsecured CI/CD processes to gain highest-privilege access and compromise the entire development chain. Through live demonstrations, attendees will explore a range of attack vectors - from compromising build servers and exploiting misconfigurations in container registries to injecting malicious code into dependencies. Watch how these techniques can be leveraged across popular development and deployment platforms, leading to a full compromise of the supply chain. The session concludes with strategies to reduce risks and strengthen DevOps security, ensuring your pipeline is a development tool, not a target for attackers.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country