SECURITY AND RISK MANAGEMENT



Similar documents
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Secure Development LifeCycles (SDLC)

Beyond ISO Intel's Product Security Maturity Model (PSMM)

Secure Development Lifecycle. Eoin Keary & Jim Manico

! Resident of Kauai, Hawaii

Building Security into the Software Life Cycle

How To Protect Your Data From Attack

Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Secure Code Development

Enterprise Application Security Program

Software Development: The Next Security Frontier

Certified Information Security Manager (CISM)

MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden

Journey of a Document CoE. History of a Document CoE At Unum Group September 2014

Development Processes (Lecture outline)

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

The Evolution of Application Monitoring

Microsoft SDL: Agile Development

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Survey on Application Security Programs and Practices

Welcome! Scaled Agile Reston, VA

Application Overhaul. Key Initiative Overview

Matt Bartoldus

AGIL JA, ABER SICHER? , ANDREAS FALK, 34. SCRUM TISCH

Application Security Architecture: Timing & Requirements Getting It Right and On Time

Course Title: Managing the Agile Product Development Life Cycle

How We Implemented Security in Agile for 20 SCRUMs- and Lived to Tell

Software Quality Testing Course Material

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Agile and Secure: Can We Be Both?

Enabling Data Quality

Learning objectives for today s session

Ensuring Governance in an Agile World

Auditing the Software Development Lifecycle ISACA Geek Week. Mike Van Stone Sekou Kamara August 2014

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Requirements Management Practice Description

A Study of RE Across Different Software Development Lifecycle Models. Afiya Nusrat and Navreet Ghag CS 846 Spring 2015

Successfully Doing TOGAF in a Scrum Project

Cloud Computing and Data Center Consolidation

FAA Cloud Computing Strategy

IMQS TECHNOLOGY AGILE METHODOLOGY

When is Agile the Best Project Management Method? Lana Tylka

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Building Security Into The Software Life Cycle

Health Data Analytics (HDA) Build the organizational capabilities to create value from HDA

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

Agile project portfolio manageme nt

Open Group SOA Governance. San Diego 2009

Agile Requirements Engineering + LESSONS LEARNED

Quality Assurance in an Agile Environment

Intel Security Software / Product Security Practices

112 BSIMM Activities at a Glance

The AppSec How-To: 10 Steps to Secure Agile Development

EXPLORING THE CAVERN OF DATA GOVERNANCE

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

A Practical Guide to Agile BPM Implementation

Software Security Touchpoint: Architectural Risk Analysis

Collaborating for Quality in Agile Application Development From Beginning to End

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION

Architecture Rules Enforcement and Governance Using Aspects

Leveraging Agile and CMMI for better Business Benefits Presented at HYDSPIN Mid-year Conference Jun-2014

Threat Modelling (Web)Apps Myths and Best Practices OWASP The OWASP Foundation Matthias Rohr

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

State of Oregon. State of Oregon 1

Identity and Access Management. Key Initiative Overview

Certified ScrumMaster (CSM) Content Outline and Learning Objectives January 2012

Project Lifecycle Management (PLM)

Practice Description Business process management and enterprise architecture

HP ALM11 & MS VS/TFS2010

Leveraging RUP, OpenUP, and the PMBOK. Arthur English, GreenLine Systems

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Water-Scrum-Fall Agile Reality for Large Organisations. By Manav Mehan Principal Agile consultant

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification

Cloud Computing and SOA from Enterprise Perspective. Yan Zhao, PhD ArchiTech Consulting LLC Oct.

Certified ScrumMaster (CSM) Content Outline and Learning Objectives January 2012

Reducing Application Vulnerabilities by Security Engineering

Project Management Office Best Practices

Transcription:

SECURITY AND RISK MANAGEMENT IN AGILE SOFTWARE DEVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12

#WHOAMI Security Architect @ Financial Services Organization Location: Austin, TX Certified Scrum Master TOGAF 9 Certified Architect Co-Author: Spring Roo in Action Book Editor (InfoQ.com) 2

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 3

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 4

PROGRAM Goals: Security & Risk Management at Enterprise level Build Security In Sustainable Compliance Risk based Security Architecture Strategy Architecture Framework Process 5

ORGANIZATIONAL AGILITY Vertical: Strategy Portfolio Project Release Iteration/Sprint Daily Sprints Horizontal: Process People Tools/Technologies 6 Source: VersionOne

SECURITY ARCHITECTURE PROGRAM Strategy Communication Plan / Metrics Framework Process Initiatives / Engagements Stakeholder Matrix Disciplines Projects CoE Team Components R&D Activities 7

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 8

FRAMEWORK Defines Structure and Lifecycle of the Architecture Strategy Structure: Framework Components Structure: Disciplines Components Activities Lifecycle: Process Activities Components mapping with Process Activities 9

REFERENCE FRAMEWORKS NIST 800-53 FISMA TOGAF 9 Microsoft Secure Development Lifecycle (SDL) BSIMM SAFECode OWASP Standards 10

DISCIPLINES Security Assessment & Authorization Security Architecture & Design Identity and Access Management (IAM) System & Information Integrity Systems & Communications Protection SIEM Technologies and Tools Governance 11

COMPONENTS Risk Assessment Threat Modeling Identification and Authentication Data Security Application Security Technologies and Tools Standards and Best Practices R&D 12

DISCIPLINES V. COMPONENTS Security Assessment & Authorization Architecture and Design Identity and Access Management System and Information Integrity Risk Assessment Regulatory Compliance Threat Modeling Reference Architecture and RI Model Driven Security Identification and Authentication Access Control ESSO Data Security Encryption Application Security Standards and Best Practices Reviews (Architecture, Design and Code) R&D Governance 13

STANDARDS Standards at all levels of product development Architecture Design & Coding (based on OWASP Standards) Technologies & Tools Standards Enforcement Automatic scans Manual Reviews Lifecycle: Identify exceptions/waivers at beginning of project Continuous feedback to refine standards (via Agile retrospectives) 14

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 15

ARCHITECTURE LIFECYCLE PROCESS Integrate security risk assessment and management into all phases of product development Security touch-points with PMLC & SDLC processes Reviews to ensure architecture compliance Reviews v. Sign-offs 16

PRODUCT LIFECYCLE (PMLC) Product Vision Support & Maintenan ce Inception Implemen tation Architectu re Testing Design & Developme nt 17

PMLC W/ SECURITY TOUCHPOINTS Support & Maintena nce Product Vision Risk Assessme nt Security Sign-off Inceptio n Impleme ntation Security Architect ure Assessme nt Security Architect ure Review Design & Developm ent Architect ure 18

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 19

ASSESSMENTS AND REVIEWS Product Vision Risk Assessment Initial Check Initial Check Architecture Privacy/ Info Security Assessment Security Architecture Review Product Initiation Design & Development Design & Development Security Code Review Functional Testing Functional Testing Security Architecture Impl Review Performance Testing Performance Testing Final Security Review and Sign-off Implementation 20

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 21

CENTERS OF EXCELLENCE Cross-team Security Architecture and Risk Management group Champion the management and governance of all aspects of security architecture program Core and Extended Teams Application, Security and Data Business and Technology 22

COE CHARTER Risk Assessments Security Architecture and Design Consulting Communicate architecture decisions & guidelines to project teams Review & present security architecture related proposals to ARB Escalate critical security issues Awareness & Education (via Newsletters, Wiki, Brown Bag sessions) Security Training Security Reviews (Architecture, Design, and Development) Threat Modeling (Future) Guidance on Code Scans, Pre-deployment Scans & Penetration Testing Assist in product development and product acquisition 23

ENGAGEMENTS Collaboration between team members Communication at the right places in the process Security requirements & test cases during Sprint Planning Security architecture walk-throughs Architecture retrospectives (end of sprint) Projects, Initiatives, Ad-Hoc Consulting Governance Model Research Labs (for R&D) 24

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 25

TRAINING AND AWARENESS Education focused - Learning v. Teaching Stakeholder specific Business Analyst, Product / Project Manager QA Testing Engineer Technical Lead, Developer DBA, Network Admin Topic/Module Specific Requirements Management Testing and Validation Development: User Interface, Services, Data, SQL Injection, XSS Internal & External; Online & Classroom based 26

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 27

LESSONS LEARNED Manual architecture, design and code reviews Solution: Automated Static & Dynamic Code Analysis Tool Skill set challenges Solution: Enhancements to training program Assessments overhead Solution: Refinements based on project experience 28

ROADMAP Current State: 2+ yrs since the start (3 yrs effort at the previous organization) Threat Modeling (Agile Version) Security & risk management aspects in: Social Computing * Mobile Development * Cloud Computing NoSQL Databases * In progress 29

AGENDA Security Architecture Program Architecture Strategy and Framework Development Process Changes Security and Risk Assessments Architecture Centers of Excellence Training and Awareness Lessons Learned Conclusions 30

CONCLUSIONS Get commitment from Senior Mgmt. team Get involved in the strategic planning process Process and Standards are critical Automate the process as much as possible Agile governance model Community of best practices (CoE) Agile or Security v. Agile and Security One Size Fits All fits nothing 31

RESOURCES Agile Threat Modeling (http://www.infoq.com/articles/threat-modeling-express) TOGAF SABSA The Building Security In Maturity Model (BSIMM) (http://bsimm.com) Software Security: Building Security In by Gary McGraw Secure Programming with Static Analysis by Brian Chess and Jacob West Security Metrics (http://www.securitymetrics.org/content/wiki.jsp) 32

THANK YOU Contact Information http://www.infoq.com/author/srini-penchikala srinipenchikala@gmail.com @srinip http://srinip2007.blogspot.com Spring Roo in Action Book Questions? 33