Reduce Security Risk in Your Development

Slides:



Advertisements
Similar presentations
Iteration Planning.
Advertisements

Prescriptive Process models
SCRUM basics Julie Rudder & Claire Stewart. What is scrum (Claire) Scrum roles (Claire) Scrum rhythms and processes (Claire) How to write stories (Julie)
Reduce Security Risk in Your Development
Course: e-Governance Project Lifecycle Day 1
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Agile Development Primer – Using Roundtable TSMS in an Agile Shop Michael G. Solomon Solomon Consulting Inc.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Interoperability. What is testing? Where have we come from? Where are we now? Why is nFocus at MSAIC? Overview.
Chapter 2 – Software Processes Lecture 1 1Chapter 2 Software Processes.
Agile Usability Testing Methods
Sharif University of Technology Session # 3.  Contents  Systems Analysis and Design Sharif University of Technology MIS (Management Information System),
<<replace with Customer Logo>>
© 2013 IBM Corporation Tivoli and Maximo Quality Improvement Initiatives March 2014.
Agile development By Sam Chamberlain. First a bit of history..
GAI Proprietary Information
05 | Define End Value for the Software Iteration Steven Borg | Co-founder & Strategist, Northwest Cadence Anthony Borton | ALM Consultant, Enhance ALM.
Computer Engineering 203 R Smith Agile Development 1/ Agile Methods What are Agile Methods? – Extreme Programming is the best known example – SCRUM.
Xtreme Programming. Software Life Cycle The activities that take place between the time software program is first conceived and the time it is finally.
Risk Management Vs Risk avoidance William Gillette.
Agile Methodologies for Project Management By – Komal Mehta.
> Blueprint Kickoff >. Introductions Customer Vision & Success Criteria Apigee Accelerator Overview Blueprint Schedule Roles & Responsibilities Communications.
Project Management An Overview John Mulhall MIICM; LIB International Credit & Process Management Professional.
Gaining Support for a Sustainable Agile Transformation Dennis Stevens, VP Enterprise Engagements LeadingAgile November 12, 2013.
Measuring Security Best Practices with OpenSAMM Alan Jex SnowFROC 2013.
Introduction to RUP Spring Sharif Univ. of Tech.2 Outlines What is RUP? RUP Phases –Inception –Elaboration –Construction –Transition.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Deeper Dive Into: User Stories.
Chapter 2 The process Process, Methods, and Tools
Agile Adoption GMAS Product / Practice Teams PMO Meeting – May 2014.
(ISC)2 SecureLondon 2009, London, United Kingdom This information is not intended, and should not be construed, as an offer to sell, or as a solicitation.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Describing Methodologies PART II Rapid Application Development* Systems Analysis and Design II.
Testing Challenges in an Agile Environment Biraj Nakarja Sogeti UK 28 th October 2009.
Sri Lanka Institute of Information Technology Software Engineering Project – I Clone of Rally GROUP NO : WD-SEP-002 | PROJECT NO :25 PROJECT : CLONE OF.
Using Business Scenarios for Active Loss Prevention Terry Blevins t
Release and Iteration Planning September 13, 2008.
How To Build a Testing Project 1 Onyx Gabriel Rodriguez.
Role-Based Guide to the RUP Architect. 2 Mission of an Architect A software architect leads and coordinates technical activities and artifacts throughout.
Systems Design Approaches The Waterfall vs. Iterative Methodologies.
1 Activities covered by project management Feasibility study Is project technically feasible and worthwhile from a business point of view? Planning Only.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Information Security Antipatterns in Software Requriements Engineering Miroslav Kis Presented by Liping Cai.
Extreme Programming (XP). Agile Software Development Paradigm Values individuals and interactions over processes and tools. Values working software over.
1 Software Engineering: A Practitioner’s Approach, 7/e Chapter 2 Process: A Generic View Software Engineering: A Practitioner’s Approach, 7/e Chapter 2.
Chapter 2: Testing in Software Life Cycle MNN1063 System Testing and Evaluation.
CSPC 464 Fall 2014 Son Nguyen. 1. The Process of Software Architecting, Peter Eeles, Peter Cripss 2. Software Architecture for Developers, Simon Brown.
Stand Up Comedy Project/Product Management
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Process Asad Ur Rehman Chief Technology Officer Feditec Enterprise.
Software Testing Process
Successful Software Practice How to successfully work as a team to create software Chris Mendes, Chief Technology Officer Sirca Limited March 2012.
1 Chapter 2 SW Process Models. 2 Objectives  Understand various process models  Understand the pros and cons of each model  Evaluate the applicability.
RATIONAL UNIFIED PROCESS PROCESS FRAMEWORK OVERVIEW.
Informed Traveler Program and Applications Agile / Scrum Overview Jerry Inberg.
4.2 SOFTWARE DEVELOPMENT METHODOLOGGY PRESENTED BY : AZURA IBRAHIM SYARIFAH SYAZA BTE SEYD ZULKAFLY CS230(5A)
Certified Software Tester How To Build a Testing Project, Part 1.
Methodologies and Algorithms
The Project Infrastructure
Agile Software Development II
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Chapter 2 SW Process Models
Product Backlog List of things that needs to be done to make the product come into existence 
Pega 9/14/2018 8:48 AM Definition of Done = ready for PO acceptance
Software Assurance Maturity Model
Introduction to Agile Blue Ocean Workshops.
Real World Scrum with TFS & VSTS / Azure DevOps
KNOWLEDGE MANAGEMENT (KM) Session # 36
Software Development In Agile
Agile, Scrum and CMMI Methodologies
Presentation transcript:

Reduce Security Risk in Your Development Part II: Creating an Agile SSDLC Trent R. Hein, CCIE, CISSP, ISSMP, ISSAP, CSSA #SecureDev

What We’ll Cover Today How is secure Agile development different? Creating a User Story with integrated security Security Tasks and Testing Managing security Defects Security architecture Agile Threat Map #SecureDev

Quick Recap of Session 1 Information security overview What are the most common threats? How to protect sensitive data, both from a methodology and technology standpoint Standards and tools NIST SP 800-53A, OpenSAMM, OWASP

How is Secure Agile Development Different? Traditional / Waterfall Agile Security Timing Distinct security-focused project phases, often at beginning and end of project Security skills brought in from outside project, often disconnected from dev/test resources Specific security testing phase, often at end of project. Every iteration considers security, but is not limited by it. Every team member is responsible for security. Security skills are embedded in the team. Hybrid security and functionality testing, throughout project. Security Resources Security Validation

Secure Agile Development Guiding Principles Product value improves with security. Security is integral to the product, not an afterthought. Outside security resources (standards, threats, experts) provide background, not a cage.

Agile security myths - 1 Myth: I’m a developer / product owner / scrum master. Security is someone else’s job. Reality: The complex threats facing applications today requires everyone to be thinking about security. Secure business logic Secure coding practices Secure test methods Secure data architecture Secure deployment environment

Agile security myths - 2 Myth: Compliance with an Information Security Standard isn’t Agile Reality: Compliance with an Information Security Standard, such as NIST SP 800-53A, is actually easier in an Agile environment, because “baking in” security in smaller pieces allows for simple compliance test cases and less backtracking

Secure User Stories The #1 tenet of secure Agile development is to “bake” security into every user story Remember: Stories should be defined such that the lowest level child story can be implemented and accepted in a single iteration Any security component(s) of the story, therefore, must be lightweight What is the most basic security functionality required for the story to be compliant? Don’t let security define the user story. Let the user story define the security.

Great, Secure User Stories (from Write a Great User Story, by Ronica Roth)

VIDEO DEMO 1 VIDEO DEMO – Creating a great user story with security elements included in Acceptance Criteria and Definition of Done

Secure User Story DON’Ts DON’T change the user story template “As a <user type>, I want to <function> so that <benefit>” NOT “As a <user type>, I want to <function> so that <benefit> and <yadda yadda yadda security drivel here>” DON’T create “Security Epics” DON’T assign secure user story creation to “the security guy/gal” DON’T put technical security tasks in the user story itself.

Security Tasks For each user story, the Developer should create tasks necessary to meet security acceptance criteria Developer should also detail any security testing tasks, as part of defining all the testing tasks for the story Security review may also be added as a task, assigned to a security specialist

VIDEO DEMO 2 VIDEO DEMO – Adding security related tasks and testing to a user story

Security Defects Security defects may be identified As part of iteration testing After product deployment Tagging security defects makes them easier to identify and prioritize Once defined, security defects are managed along with other defects as part of iteration acceptance and scheduling

VIDEO DEMO 3 VIDEO DEMO – Security defect management

Security Architecture From The Principles of Agile Architecture by Alex Yakyma and Dean Leffingwell, with contributions from Ryan Martens and Mauricio Zamora

Security Architecture [..] in the context of secure Agile enterprise software systems, we need both: fast, local control of emergent design so that teams react appropriately to changing security requirements without excessive attempts to future risk proof the system, and global control of Intentional Architecture, the guidance needed to assure that the system as a whole has conceptual integrity and efficacy security. Achieving the right balance of emergent design and intentional architecture drives effective secure evolution of the system [..] From The Principles of Agile Architecture by Alex Yakyma and Dean Leffingwell, with contributions from Ryan Martens and Mauricio Zamora

Agile Threat Mapping Assessment of key threats to business value, process, or data set Tied to real-world, known threats – not “theoretical” Communicated to all team members Completed by team, not by “security guy/gal”

Agile Threat Mapping Template <Business Value> or <Business Process> or <Data Set> <Business Value> or <Business Process> or <Data Set> <Business Value> or <Business Process> or <Data Set> <Business Value> or <Business Process> or <Data Set> Confidentiality: (High, Med, Low) Integrity: (High, Med, Low) Availability: (High, Med, Low) Confidentiality: (High, Med, Low) Integrity: (High, Med, Low) Availability: (High, Med, Low) Confidentiality: (High, Med, Low) Integrity: (High, Med, Low) Availability: (High, Med, Low) Confidentiality: (High, Med, Low) Integrity: (High, Med, Low) Availability: (High, Med, Low) A1 – Injection A3 – Cross-site Scripting A6 – Sensitive Data Exposure A1 – Injection A3 – Cross-site Scripting A6 – Sensitive Data Exposure A1 – Injection A3 – Cross-site Scripting A6 – Sensitive Data Exposure A1 – Injection A3 – Cross-site Scripting A6 – Sensitive Data Exposure

Checking Our Work

Contact me: trent@appliedtrust.com Twitter: @trenthein Questions? Contact me: trent@appliedtrust.com Twitter: @trenthein #SecureDev

Up Next: Agile Secure Code Review July 24th | 10am ET Trent R. Hein, CCIE, CISSP, ISSMP, ISSAP, CSSA #SecureDev

Go Agile. Go Rally. #SecureDev