![Page 1: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/1.jpg)
A Proactive Strategy for Security Management at WSO2
Tharindu EdirisingheSenior Software Engineer
WSO2 Platform Security Team
![Page 2: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/2.jpg)
Agenda
● How security is integrated into the software development life cycle of WSO2
● Security integration in the automated software build processes
● The mandatory security checks performed before releasing products
● The security vulnerability reporting process of WSO2
● How the WSO2 security team collaborates with other parties
● The security patch release strategy
● How you can become a contributor
![Page 3: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/3.jpg)
Security in Software Development Life Cycle
![Page 4: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/4.jpg)
Team Collaboration and Governance
![Page 5: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/5.jpg)
Security in 3rd Party Dependencies
![Page 6: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/6.jpg)
Security in 3rd Party Dependencies Contd.
![Page 7: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/7.jpg)
Security Best Practices in Development Phase
![Page 8: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/8.jpg)
Security in Testing Phase
![Page 9: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/9.jpg)
Automated Security Scans in Build Process
![Page 10: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/10.jpg)
Security Checks Before Releasing Products
![Page 12: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/12.jpg)
Security Patch Release Strategy
![Page 13: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/13.jpg)
Monthly Security Bulletin - Customer Announcement
![Page 14: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/14.jpg)
Security Advisory - Example
![Page 15: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/15.jpg)
Security Advisory - Example
contd.
![Page 16: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/16.jpg)
Security Patch Release - Public Announcement
http://wso2.com/security-patch-releases/
![Page 17: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/17.jpg)
Security Advisories -
Public
https://docs.wso2.com/display/Security/Security+Advisories
![Page 18: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/18.jpg)
Acknowledgements
https://docs.wso2.com/display/Security/Acknowledgments
![Page 19: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/19.jpg)
Awareness on Security
![Page 20: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/20.jpg)
How you can contribute ?
![Page 21: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/21.jpg)
Questions?
![Page 22: A Proactive Strategy for Security Management at WSO2](https://reader031.vdocument.in/reader031/viewer/2022022203/586e80921a28aba0038b525f/html5/thumbnails/22.jpg)
Thank You!