Movatterモバイル変換


[0]ホーム

URL:


Atlassian, profile picture
Uploaded byAtlassian
9,768 views

Enable DevSecOps using Jira Software

The document discusses the integration of DevSecOps within Jira software to enhance application security by standardizing the vulnerability scanning process, enabling collaboration between application security and development teams, and improving operational efficiency. Key benefits include significant time savings in generating reports, simplified remediation workflows, and a consolidated platform for vulnerability management. Overall, the initiative aims to make security processes more efficient and cost-effective while meeting regulatory needs.

Embed presentation

Enable DevSecOps using JiraSoftwareSaurabh GuptaMarch 02, 2019DevOps Solution Engineer Head of Developer EfficiencyGroupMostofa Rahman
2 Information Classification: PublicEveryone isresponsible forsecurity
3 Information Classification: PublicDeveloper OperationSecurity
4 Information Classification: PublicApplication Security
5 Information Classification: PublicSecurity ScannigScanningSQL Injection Insufficient Input ValidationInformation Leakage Code QualityCryptographic IssuesCRLF InjectionCross Site ScriptingAccess Control Missing AuthenticationPrivilege EscalationHTTP Verb TamperingOpen Source ComponentScanning
6 Information Classification: PublicPlanDevelopBuildTestReleaseDeployOperateContinuousDeliveryContinuousIntegration
Effect of scan frequencyon flaw persistenceanalysis.STATE OF SOFTWARESECURITY VOL 9
8 Information Classification: Public2017 EMA reportA 2017 EMA report found thetop two benefits- better ROI improved- operational efficiencies
9 Information Classification: PublicSecurity Considerations
10 Information Classification: PublicTakes Timec
11 Information Classification: PublicTakes Time Adds CostccApplication Security
12 Information Classification: PublicTakes Time Adds CostReducesInnovationccc
13 Information Classification: PublicAutomation Opportunity
14 Information Classification: PublicSemi-Automated Process
15 Information Classification: PublicWhy Jira
16 Information Classification: PublicSolution ImplementationWhat we did?
17 Information Classification: PublicIntegratedmultiplescanningtools withJira
18 Information Classification: PublicScanning Tools Auto Issue CreationUsing any of the methods- Jira Plugin - Back end Script- Jira Rest API
19 Information Classification: PublicTo achieve all the functionalities we integrated our Jira with multiple datasourcesApplication Information SourceScan Request System Due Date Calculation System
20 Information Classification: PublicStandardize received dataü All fields are populatedü Right fields are populatedü Data in the scanning tool and data inJira matchesü Run different models for datastandardization and calculationaccording to user needs
21 Information Classification: PublicStandardize received dataü Recalculating severity based onCVSS, CWE ID, CVE IDü Adding remediation data based onCWE ID & CVE IDü Calculating remediation start dateü Calculating due date
22 Information Classification: PublicBNY Jira structureAS = App Sec JiraAD = App Dev JiraJira 1 AS Jira 2 AD Jira 3 AD Jira 4 AD Jira 5 AD
23 Information Classification: PublicWorkflow
24 Information Classification: PublicJira & Beyond
25 Information Classification: PublicFull ArchitectureScanning ToolsApplicationsList ofVulnerabilitiesPushed/Pulledinto JiraStandardizationtaskApp Sec JiraConnect toexternal systemfor differentparametersInformationSystemScanRequestSystemDue DateCalculationSystemData ValidationandRequired fieldscheckPush to othersystems foranalysticsApp Dev Jira
26 Information Classification: PublicChallenges Faced
27 Information Classification: PublicChallengesAPI Limitations
28 Information Classification: PublicChallengesAPI LimitationsClean Ups
29 Information Classification: PublicChallengesAPI LimitationsClean UpsCollaboration
30 Information Classification: PublicChallengesAPI LimitationsClean UpsCollaborationInfrastructure
31 Information Classification: PublicChallengesAPI LimitationsClean UpsCollaborationScope ChangesInfrastructure
32 Information Classification: PublicBenefits
33 Information Classification: PublicBefore• Scan Applications• Suggest remediation• Generate reports• Communicate reportsAfter• Scan Applications• Suggest remediationSecurity Analyst Responsibilities
34 Information Classification: PublicRegulatory
35 Information Classification: PublicOne StopShop For ALLApp Dev TeamThey do not need to go to different tools to getvulnerability information. Also, saving the effort tolearn new tool.WorkflowBoth teams can collaborate on the same Jiraissue. Saving time otherwise spent on back andfro.App Sec TeamNew workflow enables App Sec team toaccept/reject false positive findings.
36 Information Classification: PublicTime saved on generating & communicating report( 50 X 2 ) = 100 hours per dayNumber ofhours spentNumber ofSecurity Analyst* via Bloomberg/Payscale/IMG
37 Information Classification: PublicTime saved on generating & communicating report( 50 X 2 ) X 22 = 2200 hours per monthNumber ofhours spentNumber ofSecurity Analyst* via Bloomberg/Payscale/IMG
38 Information Classification: PublicTime saved on generating & communicating report( 50 X 2 ) X 262 = 26,200 hours per yearNumber ofhours spentNumber ofSecurity Analyst* via Bloomberg/Payscale/IMG
39 Information Classification: Public25%Of Effort Saved
40 Information Classification: PublicSummary & Takeaways
41 Information Classification: Public• DevSecOps is the new unicorn, who everyone wants to ride on• Enables shift left• Jira software integration with DevSecOps• Build workflow to simplify the remediation process• Reduces administrative work• Satisfy regulator/auditor needs• Full traceability• Facilitates ease of access• Security becomes cheaper and efficient when using DevSecOpsSummary
42 Information Classification: PublicBNY Mellon is the corporate brand of The Bank of New York Mellon Corporation and may be used as a generic term to reference the corporationas a whole and/or its various subsidiaries generally. Products and services may be provided under various brand names in various countries byduly authorized and regulated subsidiaries, affiliates, and joint ventures of The Bank of New York Mellon Corporation. Not all products andservices are offered in all countries.BNY Mellon will not be responsible for updating any information contained within this material and opinions and information contained herein aresubject to change without notice.BNY Mellon assumes no direct or consequential liability for any errors in or reliance upon this material. This material may not be reproduced ordisseminated in any form without the express prior written permission of BNY Mellon.©2019 The Bank of New York Mellon Corporation. All rights reserved.Disclosure

Recommended

PPTX
Enable DevSecOps using JIRA Software
 
PDF
Securing DevOps Lifecycle
PDF
DevSecOps - The big picture
PPTX
DevSecOps - It can change your life (cycle)
DOCX
10 things to get right for successful dev secops
PDF
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PDF
Achieving a Serverless Development Experience
PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
PDF
Data-Driven DevOps: Improve Velocity and Quality of Software Delivery with Me...
 
PPTX
Building an AppSec Pipeline: Keeping your program, and your life, sane
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PDF
Enterprise DevOps Series: Using VS Code & Zowe
PDF
DevSecOps at the GSA
PDF
Take Control: Design a Complete DevSecOps Program
PPTX
DevSecOps reference architectures 2018
PDF
Integrating SAP into DevOps Pipelines: Why and How
PPTX
DevSecOps OWASP
PPTX
Splitting the Check on Compliance and Security
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
Devops the Microsoft Way
PDF
Application Asset Management with ThreadFix
PDF
Driving Service Ownership with Distributed Tracing
PDF
DevSecOps for the DoD
PDF
Dos and Don'ts of DevSecOps
PPTX
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
PDF
Diving Deeper into DevOps Deployments
PDF
Barriers to Container Security and How to Overcome Them
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
Security as Code (Second Early Release) Bk Sarthak Das

More Related Content

PPTX
Enable DevSecOps using JIRA Software
 
PDF
Securing DevOps Lifecycle
PDF
DevSecOps - The big picture
PPTX
DevSecOps - It can change your life (cycle)
DOCX
10 things to get right for successful dev secops
PDF
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PDF
Achieving a Serverless Development Experience
Enable DevSecOps using JIRA Software
 
Securing DevOps Lifecycle
DevSecOps - The big picture
DevSecOps - It can change your life (cycle)
10 things to get right for successful dev secops
Code-to-Cloud Visibility: An Essential Framework for DevOps Success
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Achieving a Serverless Development Experience

What's hot

PPTX
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
PDF
Data-Driven DevOps: Improve Velocity and Quality of Software Delivery with Me...
 
PPTX
Building an AppSec Pipeline: Keeping your program, and your life, sane
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PDF
Enterprise DevOps Series: Using VS Code & Zowe
PDF
DevSecOps at the GSA
PDF
Take Control: Design a Complete DevSecOps Program
PPTX
DevSecOps reference architectures 2018
PDF
Integrating SAP into DevOps Pipelines: Why and How
PPTX
DevSecOps OWASP
PPTX
Splitting the Check on Compliance and Security
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
Devops the Microsoft Way
PDF
Application Asset Management with ThreadFix
PDF
Driving Service Ownership with Distributed Tracing
PDF
DevSecOps for the DoD
PDF
Dos and Don'ts of DevSecOps
PPTX
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
PDF
Diving Deeper into DevOps Deployments
PDF
Barriers to Container Security and How to Overcome Them
Overcoming the old ways of working with DevSecOps - Culture, Data, Graph, and...
Data-Driven DevOps: Improve Velocity and Quality of Software Delivery with Me...
 
Building an AppSec Pipeline: Keeping your program, and your life, sane
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
Enterprise DevOps Series: Using VS Code & Zowe
DevSecOps at the GSA
Take Control: Design a Complete DevSecOps Program
DevSecOps reference architectures 2018
Integrating SAP into DevOps Pipelines: Why and How
DevSecOps OWASP
Splitting the Check on Compliance and Security
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Devops the Microsoft Way
Application Asset Management with ThreadFix
Driving Service Ownership with Distributed Tracing
DevSecOps for the DoD
Dos and Don'ts of DevSecOps
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Diving Deeper into DevOps Deployments
Barriers to Container Security and How to Overcome Them

Similar to Enable DevSecOps using Jira Software

PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PDF
Security as Code (Second Early Release) Bk Sarthak Das
PPTX
How to Get Started with DevSecOps
 
PPTX
Devsec ops
PPTX
Introduction to DevSecOps
PDF
DevSecOps Automation for Product Security
PDF
AppSec in an Agile World
PDF
Security as Code (Second Early Release) Bk Sarthak Das
PDF
The What, Why, and How of DevSecOps
 
PDF
DevOps and Devsecops.pdf
PPTX
DevSecOps and Drupal: Securing your applications in a modern IT landscape
PPTX
Runtime Protection in the Real World
PPTX
Solnet dev secops meetup
 
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PDF
Summer "Tuning" in Jira and DevSecOps
 
PPTX
DevSecOps without DevOps is Just Security
PDF
Enterprise Devsecops
 
PDF
DevOps and Devsecops- What are the Differences.
PPTX
The DevSecOps Advantage: A Comprehensive Guide
PDF
How to adapt the SDLC to the era of DevSecOps
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Security as Code (Second Early Release) Bk Sarthak Das
How to Get Started with DevSecOps
 
Devsec ops
Introduction to DevSecOps
DevSecOps Automation for Product Security
AppSec in an Agile World
Security as Code (Second Early Release) Bk Sarthak Das
The What, Why, and How of DevSecOps
 
DevOps and Devsecops.pdf
DevSecOps and Drupal: Securing your applications in a modern IT landscape
Runtime Protection in the Real World
Solnet dev secops meetup
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
Summer "Tuning" in Jira and DevSecOps
 
DevSecOps without DevOps is Just Security
Enterprise Devsecops
 
DevOps and Devsecops- What are the Differences.
The DevSecOps Advantage: A Comprehensive Guide
How to adapt the SDLC to the era of DevSecOps

More from Atlassian

PDF
Trusted by Default: The Forge Security & Privacy Model
PDF
Nailing Measurement: a Framework for Measuring Metrics that Matter
PDF
Designing Forge UI: A Story of Designing an App UI System
PDF
Take Action with Forge Triggers
PDF
Forge: Under the Hood
PDF
Meet the Forge Runtime
PDF
Let's Build an Editor Macro with Forge UI
PDF
Forge UI: A New Way to Customize the Atlassian User Experience
PDF
Forge App Showcase
PDF
Beyond Diversity: A Guide to Building Balanced Teams
PDF
Building Apps With Color Blind Users in Mind
PPTX
International Women's Day 2020
PDF
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
PDF
Access to User Activities - Activity Platform APIs
PDF
Tear Up Your Roadmap and Get Out of the Building
PDF
Design Your Next App with the Atlassian Vendor Sketch Plugin
PDF
Observability and Troubleshooting in Forge
PDF
10 emerging trends that will unbreak your workplace in 2020
PDF
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
PDF
Building Apps With Enterprise in Mind
Trusted by Default: The Forge Security & Privacy Model
Nailing Measurement: a Framework for Measuring Metrics that Matter
Designing Forge UI: A Story of Designing an App UI System
Take Action with Forge Triggers
Forge: Under the Hood
Meet the Forge Runtime
Let's Build an Editor Macro with Forge UI
Forge UI: A New Way to Customize the Atlassian User Experience
Forge App Showcase
Beyond Diversity: A Guide to Building Balanced Teams
Building Apps With Color Blind Users in Mind
International Women's Day 2020
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Access to User Activities - Activity Platform APIs
Tear Up Your Roadmap and Get Out of the Building
Design Your Next App with the Atlassian Vendor Sketch Plugin
Observability and Troubleshooting in Forge
10 emerging trends that will unbreak your workplace in 2020
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
Building Apps With Enterprise in Mind

Recently uploaded

PDF
Cheryl Hung, Vibe Coding Auth Without Melting Down! isaqb Software Architectu...
PDF
Mulesoft Meetup Online Portuguese: MCP e IA
PDF
[BDD 2025 - Full-Stack Development] Agentic AI Architecture: Redefining Syste...
PPTX
Support, Monitoring, Continuous Improvement & Scaling Agentic Automation [3/3]
PDF
Mastering Agentic Orchestration with UiPath Maestro | Hands on Workshop
PDF
DUBAI IT MODERNIZATION WITH AZURE MANAGED SERVICES.pdf
PDF
Transforming Supply Chains with Amazon Bedrock AgentCore (AWS Swiss User Grou...
PDF
[BDD 2025 - Mobile Development] Exploring Apple’s On-Device FoundationModels
PDF
KMWorld - KM & AI Bring Collectivity, Nostalgia, & Selectivity
PDF
[BDD 2025 - Mobile Development] Mobile Engineer and Software Engineer: Are we...
PDF
[BDD 2025 - Artificial Intelligence] AI for the Underdogs: Innovation for Sma...
PDF
PCCC25(設立25年記念PCクラスタシンポジウム):エヌビディア合同会社 テーマ2「NVIDIA BlueField-4 DPU」
PPTX
MuleSoft AI Series : Introduction to MCP
PPTX
kernel PPT (Explanation of Windows Kernal).pptx
PDF
Crane Accident Prevention Guide: Key OSHA Regulations for Safer Operations
PDF
[BDD 2025 - Mobile Development] Crafting Immersive UI with E2E and AGSL Shade...
PPTX
Connecting the unconnectable: Exploring LoRaWAN for IoT
PDF
"DISC as GPS for team leaders: how to lead a team from storming to performing...
 
PDF
Transcript: The partnership effect: Libraries and publishers on collaborating...
PDF
How Much Does It Cost To Build Software
Cheryl Hung, Vibe Coding Auth Without Melting Down! isaqb Software Architectu...
Mulesoft Meetup Online Portuguese: MCP e IA
[BDD 2025 - Full-Stack Development] Agentic AI Architecture: Redefining Syste...
Support, Monitoring, Continuous Improvement & Scaling Agentic Automation [3/3]
Mastering Agentic Orchestration with UiPath Maestro | Hands on Workshop
DUBAI IT MODERNIZATION WITH AZURE MANAGED SERVICES.pdf
Transforming Supply Chains with Amazon Bedrock AgentCore (AWS Swiss User Grou...
[BDD 2025 - Mobile Development] Exploring Apple’s On-Device FoundationModels
KMWorld - KM & AI Bring Collectivity, Nostalgia, & Selectivity
[BDD 2025 - Mobile Development] Mobile Engineer and Software Engineer: Are we...
[BDD 2025 - Artificial Intelligence] AI for the Underdogs: Innovation for Sma...
PCCC25(設立25年記念PCクラスタシンポジウム):エヌビディア合同会社 テーマ2「NVIDIA BlueField-4 DPU」
MuleSoft AI Series : Introduction to MCP
kernel PPT (Explanation of Windows Kernal).pptx
Crane Accident Prevention Guide: Key OSHA Regulations for Safer Operations
[BDD 2025 - Mobile Development] Crafting Immersive UI with E2E and AGSL Shade...
Connecting the unconnectable: Exploring LoRaWAN for IoT
"DISC as GPS for team leaders: how to lead a team from storming to performing...
 
Transcript: The partnership effect: Libraries and publishers on collaborating...
How Much Does It Cost To Build Software

Enable DevSecOps using Jira Software

  • 1.
    Enable DevSecOps usingJiraSoftwareSaurabh GuptaMarch 02, 2019DevOps Solution Engineer Head of Developer EfficiencyGroupMostofa Rahman
  • 2.
    2 Information Classification:PublicEveryone isresponsible forsecurity
  • 3.
    3 Information Classification:PublicDeveloper OperationSecurity
  • 4.
    4 Information Classification:PublicApplication Security
  • 5.
    5 Information Classification:PublicSecurity ScannigScanningSQL Injection Insufficient Input ValidationInformation Leakage Code QualityCryptographic IssuesCRLF InjectionCross Site ScriptingAccess Control Missing AuthenticationPrivilege EscalationHTTP Verb TamperingOpen Source ComponentScanning
  • 6.
    6 Information Classification:PublicPlanDevelopBuildTestReleaseDeployOperateContinuousDeliveryContinuousIntegration
  • 7.
    Effect of scanfrequencyon flaw persistenceanalysis.STATE OF SOFTWARESECURITY VOL 9
  • 8.
    8 Information Classification:Public2017 EMA reportA 2017 EMA report found thetop two benefits- better ROI improved- operational efficiencies
  • 9.
    9 Information Classification:PublicSecurity Considerations
  • 10.
  • 11.
    11 Information Classification:PublicTakes Time Adds CostccApplication Security
  • 12.
    12 Information Classification:PublicTakes Time Adds CostReducesInnovationccc
  • 13.
    13 Information Classification:PublicAutomation Opportunity
  • 14.
    14 Information Classification:PublicSemi-Automated Process
  • 15.
  • 16.
    16 Information Classification:PublicSolution ImplementationWhat we did?
  • 17.
    17 Information Classification:PublicIntegratedmultiplescanningtools withJira
  • 18.
    18 Information Classification:PublicScanning Tools Auto Issue CreationUsing any of the methods- Jira Plugin - Back end Script- Jira Rest API
  • 19.
    19 Information Classification:PublicTo achieve all the functionalities we integrated our Jira with multiple datasourcesApplication Information SourceScan Request System Due Date Calculation System
  • 20.
    20 Information Classification:PublicStandardize received dataü All fields are populatedü Right fields are populatedü Data in the scanning tool and data inJira matchesü Run different models for datastandardization and calculationaccording to user needs
  • 21.
    21 Information Classification:PublicStandardize received dataü Recalculating severity based onCVSS, CWE ID, CVE IDü Adding remediation data based onCWE ID & CVE IDü Calculating remediation start dateü Calculating due date
  • 22.
    22 Information Classification:PublicBNY Jira structureAS = App Sec JiraAD = App Dev JiraJira 1 AS Jira 2 AD Jira 3 AD Jira 4 AD Jira 5 AD
  • 23.
  • 24.
  • 25.
    25 Information Classification:PublicFull ArchitectureScanning ToolsApplicationsList ofVulnerabilitiesPushed/Pulledinto JiraStandardizationtaskApp Sec JiraConnect toexternal systemfor differentparametersInformationSystemScanRequestSystemDue DateCalculationSystemData ValidationandRequired fieldscheckPush to othersystems foranalysticsApp Dev Jira
  • 26.
    26 Information Classification:PublicChallenges Faced
  • 27.
    27 Information Classification:PublicChallengesAPI Limitations
  • 28.
    28 Information Classification:PublicChallengesAPI LimitationsClean Ups
  • 29.
    29 Information Classification:PublicChallengesAPI LimitationsClean UpsCollaboration
  • 30.
    30 Information Classification:PublicChallengesAPI LimitationsClean UpsCollaborationInfrastructure
  • 31.
    31 Information Classification:PublicChallengesAPI LimitationsClean UpsCollaborationScope ChangesInfrastructure
  • 32.
  • 33.
    33 Information Classification:PublicBefore• Scan Applications• Suggest remediation• Generate reports• Communicate reportsAfter• Scan Applications• Suggest remediationSecurity Analyst Responsibilities
  • 34.
  • 35.
    35 Information Classification:PublicOne StopShop For ALLApp Dev TeamThey do not need to go to different tools to getvulnerability information. Also, saving the effort tolearn new tool.WorkflowBoth teams can collaborate on the same Jiraissue. Saving time otherwise spent on back andfro.App Sec TeamNew workflow enables App Sec team toaccept/reject false positive findings.
  • 36.
    36 Information Classification:PublicTime saved on generating & communicating report( 50 X 2 ) = 100 hours per dayNumber ofhours spentNumber ofSecurity Analyst* via Bloomberg/Payscale/IMG
  • 37.
    37 Information Classification:PublicTime saved on generating & communicating report( 50 X 2 ) X 22 = 2200 hours per monthNumber ofhours spentNumber ofSecurity Analyst* via Bloomberg/Payscale/IMG
  • 38.
    38 Information Classification:PublicTime saved on generating & communicating report( 50 X 2 ) X 262 = 26,200 hours per yearNumber ofhours spentNumber ofSecurity Analyst* via Bloomberg/Payscale/IMG
  • 39.
    39 Information Classification:Public25%Of Effort Saved
  • 40.
    40 Information Classification:PublicSummary & Takeaways
  • 41.
    41 Information Classification:Public• DevSecOps is the new unicorn, who everyone wants to ride on• Enables shift left• Jira software integration with DevSecOps• Build workflow to simplify the remediation process• Reduces administrative work• Satisfy regulator/auditor needs• Full traceability• Facilitates ease of access• Security becomes cheaper and efficient when using DevSecOpsSummary
  • 42.
    42 Information Classification:PublicBNY Mellon is the corporate brand of The Bank of New York Mellon Corporation and may be used as a generic term to reference the corporationas a whole and/or its various subsidiaries generally. Products and services may be provided under various brand names in various countries byduly authorized and regulated subsidiaries, affiliates, and joint ventures of The Bank of New York Mellon Corporation. Not all products andservices are offered in all countries.BNY Mellon will not be responsible for updating any information contained within this material and opinions and information contained herein aresubject to change without notice.BNY Mellon assumes no direct or consequential liability for any errors in or reliance upon this material. This material may not be reproduced ordisseminated in any form without the express prior written permission of BNY Mellon.©2019 The Bank of New York Mellon Corporation. All rights reserved.Disclosure

[8]ページ先頭

©2009-2025 Movatter.jp