Security Testing Orchestration
Seamlessly integrate security scanners and orchestrate tests anywhere across your build pipelines. Enable developers to rapidly remediate vulnerabilities through intelligent prioritization and deduplication.
Certifications
- For Developers
- For Administrators
- For Architects
Prepare for the Exam
Get Certified | Harness Expert
Security Testing Orchestration - Developer
Review Study Guide
Assesses the fundamental skills to deploy your applications with STO projects.
Objective | Material |
---|---|
1. Introduction to Harness Security Testing Orchestration | |
Explain the importance of security testing in modern software development. | Harness Security Testing Orchestration (STO) Overview |
Describe the common issues in current security testing practices, including manual and standalone scanning, slow identification of vulnerabilities, siloed visibility, and inconsistent governance. | Common Scanning Problems |
2. Setting up the Environment | |
Install and configure Harness Security Testing Orchestration on a local development environment. | Onboarding Guide |
Connect Harness Security Testing Orchestration to version control systems (e.g., Git) and CI/CD pipelines, emphasizing the integration aspect to address manual and standalone scanning. | Set up a build infrastructure for STO |
3. Creating Test Plans | |
Create a basic security test plan using Harness Security Testing Orchestration. | Create a base pipeline for STO |
Define test scenarios, including target applications, endpoints, and test inputs, with a focus on automation to eliminate delays. | Targets, baselines, and variants in STO |
4. Test Automation | |
Implement basic security tests, such as OWASP Top Ten vulnerabilities scanning, and automate them within CI/CD pipelines to address the issue of delayed identification of vulnerabilities. | Orchestrate scans and ingest data |
Integrate third-party security testing tools into Harness Security Testing Orchestration to expand automated scanning capabilities. | Ingest scan results from unsupported scanners into Harness STO |
5. Test Execution and Reporting | |
Execute security tests within a CI/CD pipeline as gate checks, ensuring that vulnerabilities are identified before release. | Create a base pipeline for STO |
Analyze and interpret security test results and generate reports, promoting visibility into vulnerabilities throughout the development process. | View and troubleshoot vulnerabilities |
6. Integration and Extensibility | |
Customize security testing workflows in Harness Security Testing Orchestration to align with specific release processes, addressing inconsistent governance. | Run an Orchestrated scan in an STO Pipeline |
Integrate additional security testing tools or plugins seamlessly to consolidate scanning efforts. | |
7. Security Best Practices | |
Apply security best practices to code and infrastructure within the CI/CD pipeline, ensuring that scans are integrated into the release process. | STO Key Concepts |
Implement security testing as an integral part of the software development lifecycle, avoiding siloed visibility. | STO setup procedures |
8. Compliance and Regulations | |
Understand and adhere to relevant compliance standards (e.g., GDPR, HIPAA) in security testing. | Set up target baselines in STO |
Ensure that security testing processes align with regulatory requirements, emphasizing the importance of integration and governance. | Use governance policies and security scan results to stop STO pipelines automatically |
9. Troubleshooting and Debugging | |
Identify and resolve common issues and errors in security testing, including problems related to integration and automation. | Discover and remediate issues in an STO scan |
Debug integration problems between Harness Security Testing Orchestration and other tools to maintain a smooth CI/CD pipeline. | Discover and remediate issues in an STO scan |
10. Performance Optimization | |
Optimize security testing processes for efficiency and speed within the CI/CD pipeline. | STO Troubleshooting Guide |
Implement caching and parallelization strategies for security tests to address the issue of speed and delays in vulnerability identification. | STO ingestion workflows |
Exam Details
The Security Testing Orchestration(STO) Developer exam tests your knowledge and skills of the Harness Security Testing Orchestration module.
Prerequisites
- Basic terminal skills
- Basic understanding of on-premise or cloud architecture
Exam Details
Exam Type | Duration |
---|---|
Knowledge Exam | 90 minutes |
Covered Domain | Coverage |
---|---|
Introduction to Harness Security Testing Orchestration | 10% |
Setting up the Environment | 10% |
Creating Test Plans | 10% |
Test Automation | 15% |
Test Execution and Reporting | 15% |
Integration and Extensibility | 10% |
Security Best Practices | 10% |
Compliance and Regulations | 5% |
Troubleshooting and Debugging | 10% |
Performance Optimization | 5% |
Exam Objectives
List of Objectives
The following is a detailed list of exam objectives:
# | Objective |
---|---|
1 | Introduction to Harness Security Testing Orchestration |
1.1 | Explain the importance of security testing in modern software development. |
1.2 | Describe the common issues in current security testing practices, including manual and standalone scanning, slow identification of vulnerabilities, siloed visibility, and inconsistent governance. |
2 | Setting up the Environment |
2.1 | Install and configure Harness Security Testing Orchestration on a local development environment. |
2.2 | Connect Harness Security Testing Orchestration to version control systems (e.g., Git) and CI/CD pipelines, emphasizing the integration aspect to address manual and standalone scanning. |
3 | Creating Test Plans |
3.1 | Create a basic security test plan using Harness Security Testing Orchestration. |
3.2 | Define test scenarios, including target applications, endpoints, and test inputs, with a focus on automation to eliminate delays. |
4 | Test Automation |
4.1 | Implement basic security tests, such as OWASP Top Ten vulnerabilities scanning, and automate them within CI/CD pipelines to address the issue of delayed identification of vulnerabilities. |
4.2 | Integrate third-party security testing tools into Harness Security Testing Orchestration to expand automated scanning capabilities. |
5 | Test Execution and Reporting |
5.1 | Execute security tests within a CI/CD pipeline as gate checks, ensuring that vulnerabilities are identified before release. |
5.2 | Analyze and interpret security test results and generate reports, promoting visibility into vulnerabilities throughout the development process. |
6 | Integration and Extensibility |
6.1 | Customize security testing workflows in Harness Security Testing Orchestration to align with specific release processes, addressing inconsistent governance. |
6.2 | Integrate additional security testing tools or plugins seamlessly to consolidate scanning efforts. |
7 | Security Best Practices |
7.1 | Apply security best practices to code and infrastructure within the CI/CD pipeline, ensuring that scans are integrated into the release process. |
7.2 | Implement security testing as an integral part of the software development lifecycle, avoiding siloed visibility. |
8 | Compliance and Regulations |
8.1 | Understand and adhere to relevant compliance standards (e.g., GDPR, HIPAA) in security testing. |
8.2 | Ensure that security testing processes align with regulatory requirements, emphasizing the importance of integration and governance. |
9 | Troubleshooting and Debugging |
9.1 | Identify and resolve common issues and errors in security testing, including problems related to integration and automation. |
9.2 | Debug integration problems between Harness Security Testing Orchestration and other tools to maintain a smooth CI/CD pipeline. |
10 | Performance Optimization |
10.1 | Optimize security testing processes for efficiency and speed within the CI/CD pipeline. |
10.2 | Implement caching and parallelization strategies for security tests to address the issue of speed and delays in vulnerability identification. |
Next Steps
The Security Testing Orchestration Developer exam can start immediately after registering. Please allow up to 90 mins to complete the knowledge exam.
- Create an account in Harness University
- Review the Study Guide above.
- Register for an exam.
- Take the exam.
Prepare for the Exam
Get Certified | Harness Expert
Security Testing Orchestration - Administrator
Review Study Guide
Assesses the fundamental skills to deploy and maintain STO Engineering projects and the overall Harness Platform. This exam builds upon the STO Developer Certification.
Topic | Material |
---|---|
1. Harness Security Testing Overview | |
Understand the core principles and concepts of Harness Security Testing Orchestration. | Harness Security Testing Orchestration (STO) Overview |
Explain the importance of security testing in the software development lifecycle. | Harness Security Testing Orchestration (STO) Overview |
Differentiate between various types of security testing (e.g., static analysis, dynamic analysis, penetration testing) and their relevance in Harness. | What's supported in Harness STO |
2. Setting Up Harness Security Testing Environment | |
Install and configure Harness Security Testing Orchestration in a lab or testing environment. | Onboarding Guide for STO |
Integrate Harness with popular security testing tools and platforms. | Orchestrate scans and ingest data |
Create and manage user accounts and permissions for Harness Security Testing. | Managing Users and Groups (RBAC) |
3. Creating Security Testing Pipelines | |
Define security testing workflows within Harness, including pre-test and post-test actions. | Orchestrate scans and ingest data |
Configure pipeline triggers and conditions for automated security testing. | Trigger automated scans using GitLab merge requests |
Establish notification and alerting mechanisms for test results. | Generate automated emails for detected issues in STO |
4. Managing Test Artifacts | |
Upload and manage security test artifacts, including source code, binaries, and test data. | Orchestrate scans and ingest data |
Implement version control and artifact tagging strategies within Harness. | CD artifact sources |
Optimize storage and resource utilization for test artifacts. | Optimize STO pipelines |
5. Automated Security Test Execution | |
Execute automated security tests using various testing tools and frameworks through Harness. | Orchestrate scans and ingest data |
Schedule and orchestrate recurring security test runs. | Run an Orchestrated scan in an STO Pipeline |
Monitor and analyze test execution results and log data. | Navigate and drill down into detected issues in the Security Testing Dashboard |
6. Security Test Reporting and Analysis | |
Generate comprehensive security test reports and dashboards. | Navigate and drill down into detected issues in the Security Testing Dashboard |
Analyze test results to identify vulnerabilities and security issues. | View issues in target baselines over time in the Security Testing Overview |
Provide recommendations for remediation based on test findings. | Fix security issues using AI-enhanced remediation steps in STO |
7. Integration with CI/CD | |
Integrate Harness Security Testing into continuous integration and continuous deployment (CI/CD) pipelines. | Create a base pipeline for STO |
Ensure seamless automation and feedback loops between development and security teams. | Use looping strategies |
Implement version control and artifact tagging strategies within Harness. | Tags Reference |
8. Security Testing Best Practices | |
Demonstrate an understanding of industry best practices in security testing. | Targets, baselines, and variants in STO |
Apply secure coding principles and techniques to reduce vulnerabilities. | Targets, baselines, and variants in STO |
Stay updated with the latest security threats and vulnerabilities relevant to software development. | Severity scores and levels in STO |
9. Security Compliance and Governance | |
Implement security compliance policies and standards within Harness Security Testing. | Severity scores and levels in STO |
Ensure regulatory and industry-specific compliance (e.g., GDPR, HIPAA) in security testing processes. | Use governance policies and security scan results to stop STO pipelines automatically |
Perform security risk assessments and provide recommendations for risk mitigation. | Discover and remediate issues in Security Tests |
Exam Details
The Security Testing Orchestration Administrator exam tests your knowledge and skills of the Harness Security Testing Orchestration module.
Prerequisites
- Intermediate terminal skills
- Basic understanding of on-premise or cloud architecture
- This exam builds upon the Security Testing Orchestration Developer Exam
Exam Details
Exam Type | Duration |
---|---|
Knowledge Exam | 90 minutes |
Hands On Exam | 120 minutes |
Covered Domain | % of Coverage |
---|---|
1. Harness Security Testing Overview | 16% |
2. Setting Up Harness Security Testing Environment | 15% |
3. Creating Security Testing Pipelines | 14% |
4. Managing Test Artifacts | 11% |
5. Automated Security Test Execution | 13% |
6. Security Test Reporting and Analysis | 10% |
7. Integration with CI/CD | 9% |
8. Security Testing Best Practices | 6% |
9. Security Compliance and Governance | 6% |
Exam Objectives
List of Objectives
The following is a detailed list of exam objectives:
# | Objective |
---|---|
1 | Harness Security Testing Overview |
1.1 | Understand the core principles and concepts of Harness Security Testing Orchestration. |
1.2 | Explain the importance of security testing in the software development lifecycle. |
1.3 | Differentiate between various types of security testing (e.g., static analysis, dynamic analysis, penetration testing) and their relevance in Harness. |
2 | Setting Up Harness Security Testing Environment |
2.1 | Install and configure Harness Security Testing Orchestration in a lab or testing environment. |
2.2 | Integrate Harness with popular security testing tools and platforms. |
2.3 | Create and manage user accounts and permissions for Harness Security Testing. |
3 | Creating Security Testing Pipelines |
3.1 | Define security testing workflows within Harness, including pre-test and post-test actions. |
3.2 | Configure pipeline triggers and conditions for automated security testing. |
3.3 | Establish notification and alerting mechanisms for test results. |
4 | Managing Test Artifacts |
4.1 | Upload and manage security test artifacts, including source code, binaries, and test data. |
4.2 | Implement version control and artifact tagging strategies within Harness. |
4.3 | Optimize storage and resource utilization for test artifacts. |
5 | Automated Security Test Execution |
5.1 | Execute automated security tests using various testing tools and frameworks through Harness. |
5.2 | Schedule and orchestrate recurring security test runs. |
5.3 | Monitor and analyze test execution results and log data. |
6 | Security Test Reporting and Analysis |
6.1 | Generate comprehensive security test reports and dashboards. |
6.2 | Analyze test results to identify vulnerabilities and security issues. |
6.3 | Provide recommendations for remediation based on test findings. |
7 | Integration with CI/CD |
7.1 | Integrate Harness Security Testing into continuous integration and continuous deployment (CI/CD) pipelines. |
7.2 | Ensure seamless automation and feedback loops between development and security teams. |
7.3 | Implement version control and artifact tagging strategies within Harness. |
8 | Security Testing Best Practices |
8.1 | Demonstrate an understanding of industry best practices in security testing. |
8.2 | Apply secure coding principles and techniques to reduce vulnerabilities. |
8.3 | Stay updated with the latest security threats and vulnerabilities relevant to software development. |
9 | Security Compliance and Governance |
9.1 | Implement security compliance policies and standards within Harness Security Testing. |
9.2 | Ensure regulatory and industry-specific compliance (e.g., GDPR, HIPAA) in security testing processes. |
9.3 | Perform security risk assessments and provide recommendations for risk mitigation. |
Next Steps
The Security Testing Orchestration Administrator exam can start immediately after registering. Please allow 90 mins for the knowledge exam and approximately 120 minutes for the hands on exam.
- Create an account in Harness University
- Register for an exam. There is a $50 fee for the exam
- Review the instructions for the Hands On Exam
- Take the exams
- There will be a knowledge and hands on portion.
Prepare for the Exam
Get Certified | Harness Expert
Security Testing Orchestration - Architect (BETA COMING SOON)
Coming Soon...
Assess key technical job functions and advanced skills in design, implementation and management of STO.