Skip to content

An interactive cybersecurity curriculum designed for enterprise use at software companies using Elixir

License

Notifications You must be signed in to change notification settings

podium/elixir-secure-coding

Repository files navigation

Elixir Secure Coding Training

Elixir Secure Coding Training (ESCT)

Run in Livebook

GitHub contributors GitHub last commit GitHub issues by-label GitHub pull requests by-label

GitHub forks Twitter URL

An all-encompassing, opinionated cybersecurity curriculum designed for enterprise use at software companies using the Elixir programming language.

About | Curriculum | Usage | Contributing | License


About

Originally developed for Podium's Elixir engineers by its Product Security team, the ESCT was designed to be integrated into developer onboarding processes - teaching developers about Application Security using context that applies to them.

The content originally focused exclusively on what technology Podium uses, but quickly grew to encapsulate more areas of Application Security. The material itself is composed of views from the Product Security team at Podium as well as information sourced from reputable public information - attribution has been given wherever possible.

Today, individuals or companies wishing to try out the ESCT can and are encouraged to fork a copy of their own - please follow the relevant instructions below depending on your use case.

If you find an issue, wish to suggest an idea, or start a discussion; please see our CONTRIBUTING Guide!

Curriculum

Currently the curriculum is broken into the following 8 primary topics, each containing multiple lessons:

  1. OWASP
    • OWASP Top 10
  2. Secure SDLC
    • No Secrets In Code
    • Making Secret Rotation Easy
    • Rate Limiting
    • Principle of Least Privilege
  3. GraphQL Security
    • Disabling Introspection
    • Error Disclosure
    • Resource Exhaustion
      • Cost Theory
  4. Elixir Security
    • Atom Exhaustion
    • Protecting Sensitive Data
    • Untrusted Code
    • Timing Attacks
    • Boolean Coercion
  5. Cookie Security
    • Ingredients of a Cookie
    • The Perfect Cookie
    • Elixir Phoenix Cookies
  6. Security Anti-Patterns
    • Security Through Obscurity
    • Frontend Authorization Checks
  7. CI/CD Tooling
    • Sobelow
      • Salus
    • Semgrep
  8. The Secure Road
    • Service to Service Authentication
    • User Authorization

If you do not see a topic or lesson you would like covered, please review our open issues and our CONTRIBUTING Guide before opening a new issue - but we encourage requests!

Usage

For "Learners"

Using the ESCT as a consumer of the content is easy by just following these simple steps:

  1. Fork this repo into a space you control
    • Important to note: if you were instructed to use this course by your company, double check with the folks who are running things for your company to ensure they don't have a customized version of the training materials
  2. Clone your forked repo
  3. Load the Live Markdown files in an instance of Livebook
    • For further instructions on getting Livebook setup locally, please refer to their documentation.
  4. Complete the training as instructed and save your progress along the way!
  5. When you think you're finished, create a PR to your own fork of the training repo
    • You will receive feedback as to whether you completed it or not in the CI stage of your version control system*

*Feedback functionality will initially work in GitLab, GitHub support is in the works but lower priority

For "Educators"

Using the ESCT as a purveyor of the curriculum is relatively straight-forward:

  1. Determine if you need to customize the content to better suit your business - whether that's changing the contents to reflect internal only information or if you simply want to remove modules your engineers won't find useful.
    • If you determine that you wish to customize the content, fork the repository into your companies VCS with the necessary adjustments made.
    • In the future, there may need to be additional configuration steps regarding establishing configuration secrets for reporting purposes - at which you would also do that at this time.
  2. Instruct your workforce to follow the "Learners" instructions above using whichever version of the ESCT you would rather them use

Contributing

Please refer to our CONTRIBUTING Guide for more details on how to add to this project!

License

GitHub

About

An interactive cybersecurity curriculum designed for enterprise use at software companies using Elixir

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Languages