From commit to compromise: How attackers exploit DevOps pipeline

Thursday
 
28
 
November
1:50 pm
 - 
2:30 pm

Speakers

Adela Ramadhina

Adela Ramadhina

Offensive Cyber Security Consultant
Irradiate Security

Synopsis

Are your DevOps practices truly secure? Think your CI/CD is impenetrable? Curious about the vulnerabilities lurking in your development and deployment processes that you might have overlooked? What if an attacker could turn your own tools against you, compromising your entire organisational pipeline and delivery chain?

This presentation explores the often-underestimated vulnerabilities within DevOps environments, demonstrating how attackers can exploit unsecured CI/CD processes to gain highest-privilege access and compromise the entire development chain. Through real-world scenarios, practical insights, and activities, attendees will explore attack vectors on DevOps pipelines, including leaked secrets, token abuse, and misconfigurations in pipeline-as-code, such as code injection. Watch how these techniques can be leveraged across popular development and deployment platforms, leading to a full compromise of the supply chain. The session concludes with strategies to reduce risks and strengthen DevOps security, ensuring your pipeline is a development tool, not a target for attackers.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country