Skip to content
/ talks Public

How to secure your development pipeline with static application security test (SAST) / Dynamic application security test (DAST), software composition analysis (SCA) using Sonarqube.

Notifications You must be signed in to change notification settings

Hack23/talks

Repository files navigation

Security & Open Source Expert | Cloud Security Specialist | Information Security Professional

Website LinkedIn GitHub OpenHub

🎤 Talks & Resources by James Pether Sörling

This repository contains resources and talks by James Pether Sörling, focusing on secure development practices, application security testing, and compliance automation. Below you'll find resources from presentations, security testing tools, and examples for implementing secure practices in your projects.

📋 Contents


🔐 Secure Development Pipeline Talk

James Pether Sörling presented this talk at Javaforum Göteborg, where he discussed how to secure your development pipeline with static application security tests (SAST), dynamic application security tests (DAST), and software composition analysis (SCA) using SonarQube.

The presentation covers:

  • Integrating security into CI/CD pipelines
  • DevSecOps implementation strategies
  • Compliance automation techniques
  • Real-world examples of security testing tools

Podcast & Videos:

Presentation Materials:


📜 License Tools for Java Projects

A comprehensive comparison of license compliance tools for Java projects:

This guide covers tools for license detection, compatibility analysis, and compliance management specifically for Java ecosystems.


🛡️ Security Testing Tools

CloudFormation Security

Container Security

CI/CD Examples


🔥 Black Trigram (흑괘)

Black Trigram Logo

Realistic 2D precision combat simulator inspired by traditional Korean martial arts, focusing on precise anatomical targeting, authentic combat techniques, and detailed physics-based interactions.


🌟 Featured Projects

🔐 CIA Compliance Manager

CIA Compliance Manager Logo

Security assessment platform for the CIA triad with compliance mapping to regulatory frameworks

License CII Best Practices SLSA 3

🔍 Citizen Intelligence Agency

CIA Logo

Political transparency platform monitoring Swedish political activity with data-driven insights

License CII Best Practices SLSA 3

☁️ Lambda in Private VPC

AWS Lambda

Multi-region active/active site leveraging Resilience Hub policy compliance and runbooks

License OpenSSF Scorecard

🧪 Sonar-CloudFormation-Plugin

SonarQube Plugin

SonarQube plugin for analyzing AWS CloudFormation templates with security best practices

License CII Best Practices

🏛️ Project Architecture & Documentation

Project Current Architecture Security Architecture Future Vision
CIA Compliance Manager 🏛️ Architecture 🔒 Security 🔮 Future
Citizen Intelligence Agency 🏛️ Architecture 🔒 Security 🔮 Future
Project Process Flows State Diagrams Mindmaps
CIA Compliance Manager 📊 Flowcharts 🔄 States 🧠 Mindmaps
Citizen Intelligence Agency 📊 Flowcharts 🔄 States 🧠 Mindmaps

👤 About Me

Experienced security professional with over 30 years in information technology, specializing in security architecture, cloud security, and compliance. Currently serving as Application Security Officer at Stena Group IT, with prior roles including Information Security Officer at Polestar and Senior Security Architect at WirelessCar. Strong advocate for transparency in organizations, secure software development practices, and innovative open source solutions.

I develop advanced open source tools focused on:

  • 🔐 CIA Triad (Confidentiality, Integrity, Availability)
  • 📊 Compliance Management
  • 🔍 Political Transparency
  • ☁️ Secure Cloud Architectures

Press and Mentions:


🏅 Professional Certifications

CISSP CISM AWS Security AWS Solutions Architect

Professional Experience & Skills

%%{ init: { 'theme': 'base', 'themeVariables': { 'primaryColor': '#a0c8e0', 'primaryTextColor': '#1a1a1a', 'primaryBorderColor': '#86b5d9', 'lineColor': '#86b5d9', 'secondaryColor': '#c8e6c9', 'tertiaryColor': '#ffda9e' } } }%% mindmap root((James Pether<br>Sörling)) Information Security ::icon(fa fa-shield) Risk Assessment & Management CISSP & CISM Certified Security Architecture Design Zero Trust Principles Defense-in-Depth Compliance Frameworks ISO 27001 NIST 800-53 VDA-ISA CIS Controls GDPR Security Operations Incident Response Vulnerability Management Security Monitoring Cloud Security ::icon(fa fa-cloud) Multi-Cloud Expertise AWS Advanced Microsoft Azure Enterprise Architecture High Availability Designs Multi-Region Deployments Resilience Engineering Infrastructure as Code CloudFormation Terraform Secure Cloud Services AWS Security Hub AWS GuardDuty KMS Encryption AWS WAF Leadership & Governance ::icon(fa fa-users) Information Security Officer Security Architect Policy Development IT Governance Team Leadership Open Source Program Office AI Governance & Security Software Engineering ::icon(fa fa-code) Secure Development (SSDLC) Java/Spring Full-Stack TypeScript/JavaScript/React Automated Testing CI/CD Pipelines Code Quality SLSA Level 3 SonarQube Open Source Leadership ::icon(fa fa-github) Project Creator & Maintainer Community Contributor Security Tool Development Code Review 
Loading

Career Highlights

%%{ init: { 'theme': 'base', 'themeVariables': { 'primaryColor': '#d1c4e9', 'primaryTextColor': '#1a1a1a', 'primaryBorderColor': '#9575cd', 'lineColor': '#9575cd', 'secondaryColor': '#bbdefb', 'tertiaryColor': '#c8e6c9' } } }%% timeline title Professional Journey section Enterprise Security 2024 : Application Security Officer, Stena Group IT : Risk Assessment, Cloud Security, Microsoft Azure, AI Governance 2022 - 2024 : Information Security Officer, Polestar : ISMS Implementation, Security Compliance, Risk Management, OSPO Lead 2018 - 2022 : Senior Security Architect, WirelessCar : Security Architecture, AWS Security, Secure Development Practices section Cloud & Security Engineering 2017 - 2018 : Consultant, Consid AB : Open Source Development, CI/CD, Docker, AWS 2010 - 2017 : Cloud Architect, Keypasco : Cloud Security Solutions, Multi-Tier Architecture, AWS Infrastructure section Software Development 2008 - 2009 : Consultant, Redpill Linpro : Technical Support, System Administration, Development 2006 - 2007 : System Developer, Sky : J2EE Projects, Agile Development, Test-Driven Development 2003 - 2005 : J2EE Developer, Glu Mobile : Mobile Services, Integration 2000 - 2002 : Software Engineer, Volantis Systems : Multi-Channel Server Product Development 
Loading

🛠️ Technology & Skills

Security & Compliance

Security Architecture Risk Management ISO 27001 NIST 800-53 GDPR CIS Controls Vulnerability Management Incident Response SSDLC AI Governance

Cloud & Infrastructure

AWS CloudFormation Azure Lambda Terraform Docker Linux

Development & Languages

Java Spring TypeScript JavaScript React PostgreSQL

DevOps & Tools

SonarQube GitHub Actions Jenkins OWASP ZAP cfn-nag SLSA


🏆 Notable Contributions & Appearances

  • Information Security Officer at Polestar, leading security practices and the Open Source Program Office
  • Senior Security Architect at WirelessCar, supporting secure delivery practices and security risk management
  • Open source contributor for cfn-nag, developing integration with SonarQube for CloudFormation security analysis
  • Speaker at Javaforum Göteborg on secure architecture patterns
  • Guest on Shift Left Like A Boss security podcast
  • Featured in Computer Sweden and Riksdag och Departement for political transparency work
  • Mentioned in National Democratic Institute survey on parliamentary monitoring organizations
  • Operated Equal Rites BBS in the 1990s, part of Fidonet (Node 2:203/454)
  • committers.top badge

Project Badges & Status

CIA Compliance Manager

GitHub Release License FOSSA Status CII Best Practices OpenSSF Scorecard SLSA 3

Citizen Intelligence Agency

GitHub Release CII Best Practices OpenSSF Scorecard SLSA 3 Quality Gate Status Security Rating


🤝 Connect With Me

LinkedIn GitHub Blog Tech Talks

🔑 Security Services

Professional cybersecurity consulting services delivered remotely or in-person in Gothenburg. Drawing from over three decades of experience in software development and security architecture, we deliver practical security solutions that integrate seamlessly into your development processes without hindering innovation.


📋 Service Overview

🌐 Availability Remote or in-person (Gothenburg)
💰 Pricing Contact for pricing
🏢 Company Hack23 AB (Org.nr 5595347807)
📧 Contact LinkedIn

🎯 Core Service Areas

Area Services Ideal for
🏗️ Security Architecture & Strategy Enterprise Security Architecture: Design and implementation of comprehensive security frameworks
Risk Assessment & Management: Systematic identification and mitigation of security risks
Security Strategy Development: Alignment of security initiatives with business objectives
Governance Framework Design: Policy development and security awareness programs
Organizations needing strategic security leadership and architectural guidance
☁️ Cloud Security & DevSecOps Secure Cloud Solutions: AWS security assessment and architecture (Advanced level)
DevSecOps Integration: Security seamlessly integrated into agile development processes
Infrastructure as Code Security: Secure CloudFormation, Terraform implementations
Container & Serverless Security: Modern application security best practices
Development teams transitioning to cloud-native architectures with security focus
🔧 Secure Development & Code Quality Secure SDLC Implementation: Building security into development lifecycles
CI/CD Security Integration: Automated security testing and validation
Code Quality & Security Analysis: Static analysis, vulnerability scanning
Supply Chain Security: SLSA Level 3 compliance, SBOM implementation
Development teams seeking to embed security without slowing innovation

🏆 Specialized Expertise

Category Services Value
📋 Compliance & Regulatory Regulatory Compliance: GDPR, NIS2, ISO 27001 implementation
ISMS Design & Implementation: Information Security Management Systems
AI Governance: Emerging AI risk management frameworks
Audit Preparation: Documentation and evidence preparation
Navigate complex regulatory landscapes with confidence
🌐 Open Source Security Open Source Program Office: OSPO establishment and management
Vulnerability Management: Open source risk assessment and remediation
Security Tool Development: Custom security solutions and automation
Community Engagement: Open source security best practices
Leverage open source securely while contributing to security transparency
🎓 Security Culture & Training Security Awareness Programs: Building organization-wide security culture
Developer Security Training: Secure coding practices and methodologies
Leadership Security Briefings: Executive-level security understanding
Incident Response Training: Preparedness and response capability building
Transform security from barrier to enabler through education and culture

💡 Why Choose Hack23 Security Services?

Three decades of hands-on experience in software development and security architecture means we understand the real challenges development teams face. We don't just point out problems—we provide practical, implementable solutions that enhance security without slowing down innovation.

Our approach: Security should be seamlessly integrated into your existing processes, not bolted on afterward. We help organizations build a culture of security awareness where protection becomes a natural part of how teams work, not an obstacle to overcome.

Passionate about transparency: As advocates for open source security, we believe in sharing knowledge and building community. Our solutions are designed to be understandable, maintainable, and aligned with industry best practices.


Profile Views

Last updated: 2025-06-14 16:23:03

About

How to secure your development pipeline with static application security test (SAST) / Dynamic application security test (DAST), software composition analysis (SCA) using Sonarqube.

Topics

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published