Practical security for Elixir/Phoenix
Posted 2018-01-05 08:35:18.000000
On April 18th I will be giving a one-day workshop on software security at ElixirConf EU in Warsaw. The title of the workshop is “Practical security for Elixir/Phoenix”, and in this post I want to give a brief overview of what you can expect.
Goals
The primary goals of the workshop are:
- Introduce key concepts around secure software development
- Focus on those aspects that impact software for the Erlang VM
- Explore code examples in Elixir of weaknesses, mitigations and best-practices
- Review available libraries and tools in the Elixir ecosystem, and how to use them
The keyword is “practical”: at every step on the way we will look at Elixir sample code, wherever possible exploring it at runtime. With a solid understanding of both the ‘why’ and the ‘how’, you should be able to apply the lessons learnt in your own projects immediately.
Outline
- Secure software development lifecycle (SDLC) overview
- The Erlang/Elixir runtime environment
- Built-in defences of Plug, Phoenix, and Ecto
- Use of third party software
- Handling authentication and authorisation
- Building and configuring TLS/HTTPS servers and clients
- Use of Erlang’s crypto and PKI APIs
- Clustering with distributed Erlang
- Keeping secrets
- Lessons learnt from past vulnerabilities
- Security testing at different stages of the lifecycle
Prerequisites
The workshop assumes basic knowledge of the Elixir language, standard library and tooling. Some parts will dive a little deeper into the Erlang VM or the Erlang standard library, but no prior experience with Erlang is required.
Experience with Phoenix, or web development in general, will make it easier to follow along with those parts that focus on the web. But if web development is not your thing, don’t worry: the workshop covers all layers of the stack, it is not just about XSS and CSRF.
If you want to follow along with the hands-on parts you’ll want to know your way around your laptop’s command line, to install some basic pen-test tools. Even better: prepare a VM with Kali Linux, which comes with all the tools you’ll need pre-installed. Make sure to configure the VM’s networking to allow it to reach your Elixir/Phoenix dev environment. We won’t have much time to go through the setup process on the day of the training, so I’ll try to send out some more detailed preparation instructions beforehand.
Finally, no prior security training is required. All major concepts, such as weaknesses and techniques, will be briefly introduced, and links to learning resources will be provided for those who want to dig deeper. Because the focus is on the applicability in the Erlang/Elixir ecosystem, the workshop also has plenty to offer to those with some previous experience in other languages.
Where do I sign up?
Get your “Early Bird” tickets here while you can. Sale ends on March 11.
If you have any questions, feel free to reach out via Twitter (@voltonez), Keybase (@voltone) or the #security channel on Slack.
Back