Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/podium/elixir-secure-coding
An interactive cybersecurity curriculum designed for enterprise use at software companies using Elixir
https://github.com/podium/elixir-secure-coding
elixir elixir-lang elixir-phoenix livebook salus security security-education sobelow
Last synced: 4 days ago
JSON representation
An interactive cybersecurity curriculum designed for enterprise use at software companies using Elixir
- Host: GitHub
- URL: https://github.com/podium/elixir-secure-coding
- Owner: podium
- License: mit
- Created: 2022-06-14T17:49:13.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-01-17T19:27:45.000Z (10 months ago)
- Last Synced: 2024-05-02T03:58:16.234Z (6 months ago)
- Topics: elixir, elixir-lang, elixir-phoenix, livebook, salus, security, security-education, sobelow
- Language: Elixir
- Homepage: https://podium.com
- Size: 273 KB
- Stars: 547
- Watchers: 12
- Forks: 121
- Open Issues: 29
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- License: LICENSE.md
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
# Elixir Secure Coding Training (ESCT)
[![Run in Livebook](https://livebook.dev/badge/v1/blue.svg)](https://livebook.dev/run?url=https%3A%2F%2Fgithub.com%2Fpodium%2Felixir-secure-coding%2Fblob%2Fmain%2Fmodules%2F1-introduction.livemd)
![GitHub contributors](https://img.shields.io/github/contributors-anon/podium/elixir-secure-coding)
![GitHub last commit](https://img.shields.io/github/last-commit/podium/elixir-secure-coding)
![GitHub issues by-label](https://img.shields.io/github/issues-raw/podium/elixir-secure-coding/new%20content)
![GitHub pull requests by-label](https://img.shields.io/github/issues-pr-raw/podium/elixir-secure-coding/new%20content)![GitHub forks](https://img.shields.io/github/forks/podium/elixir-secure-coding?style=social)
![Twitter URL](https://img.shields.io/twitter/url?style=social&url=https%3A%2F%2Ftwitter.com%2Fintent%2Ftweet%3Furl%3Dhttps%253A%252F%252Fgithub.com%252Fpodium%252Felixir-secure-coding%26text%3DCheck%2520out%2520Elixir%2520Secure%2520Coding%2520Training%2520-%2520originally%2520authored%2520by%2520%40HoldenOullette%2520for%2520%40PodiumHQ%253A)### An all-encompassing, opinionated cybersecurity curriculum designed for enterprise use at software companies using the [Elixir](https://elixir-lang.org/) programming language.
[About](#about) |
[Curriculum](#curriculum) |
[Usage](#usage) |
[Contributing](#contributing) |
[License](#license)
## About
Originally developed for [Podium](https://www.podium.com)'s Elixir engineers by its Product Security team, the ESCT was designed to be integrated into developer onboarding processes - teaching developers about Application Security using context that applies to them.The content originally focused exclusively on what technology Podium uses, but quickly grew to encapsulate more areas of Application Security. The material itself is composed of views from the Product Security team at Podium as well as information sourced from reputable public information - attribution has been given wherever possible.
Today, individuals or companies wishing to try out the ESCT can and are encouraged to fork a copy of their own - please follow the relevant instructions [below](#usage) depending on your use case.
If you find an issue, wish to suggest an idea, or start a discussion; please see our [CONTRIBUTING Guide](./CONTRIBUTING.md)!
## Curriculum
Currently the curriculum is broken into the following 8 primary topics, each containing multiple lessons:
1. [OWASP](./modules/2-owasp.livemd)
- OWASP Top 10
2. [Secure SDLC](./modules/3-ssdlc.livemd)
- No Secrets In Code
- Making Secret Rotation Easy
- Rate Limiting
- Principle of Least Privilege
3. [GraphQL Security](./modules/4-graphql.livemd)
- Disabling Introspection
- Error Disclosure
- Resource Exhaustion
- Cost Theory
4. [Elixir Security](./modules/5-elixir.livemd)
- Atom Exhaustion
- Protecting Sensitive Data
- Untrusted Code
- Timing Attacks
- Boolean Coercion
5. [Cookie Security](./modules/6-cookies.livemd)
- Ingredients of a Cookie
- The Perfect Cookie
- Elixir Phoenix Cookies
6. [Security Anti-Patterns](./modules/7-anti-patterns.livemd)
- Security Through Obscurity
- Frontend Authorization Checks
7. [CI/CD Tooling](./modules/8-cicd.livemd)
- Sobelow
- Salus
- Semgrep
8. [The Secure Road](./modules/9-secure-road.livemd)
- Service to Service Authentication
- User Authorization*If you do not see a topic or lesson you would like covered, please review our [open issues](https://github.com/podium/elixir-secure-coding/labels/new%20content) and our [CONTRIBUTING Guide](./CONTRIBUTING.md) before opening a new issue - but we encourage requests!*
## Usage
### For "Learners"
Using the ESCT as a consumer of the content is easy by just following these simple steps:
1. **Fork this repo into a space you control**
- Important to note: if you were instructed to use this course by your company, double check with the folks who are running things for your company to ensure they don't have a customized version of the training materials
2. **Clone your forked repo**
3. **Load the Live Markdown files in an instance of Livebook**
- For further instructions on getting Livebook setup locally, please refer to [their documentation](https://livebook.dev/#install).
4. **Complete the training as instructed and save your progress along the way!**
5. **When you think you're finished, create a PR to **your own fork** of the training repo**
- You will receive feedback as to whether you completed it or not in the CI stage of your version control system**\*Feedback functionality will initially work in GitLab, GitHub support is [in the works](https://github.com/podium/elixir-secure-coding/issues/17) but lower priority*
### For "Educators"
Using the ESCT as a purveyor of the curriculum is relatively straight-forward:
1. **Determine if you need to customize the content to better suit your business** - whether that's changing the contents to reflect internal only information or if you simply want to remove modules your engineers won't find useful.
- If you determine that you wish to customize the content, fork the repository into your companies VCS with the necessary adjustments made.
- In the future, there may need to be additional configuration steps regarding establishing configuration secrets for reporting purposes - at which you would also do that at this time.
2. **Instruct your workforce to follow the "Learners" instructions above using whichever version of the ESCT you would rather them use**## Contributing
Please refer to our [CONTRIBUTING Guide](./CONTRIBUTING.md) for more details on how to add to this project!## License
![GitHub](https://img.shields.io/github/license/podium/elixir-secure-coding)