AGIL JA, ABER SICHER? 29.07.2015, ANDREAS FALK, 34. SCRUM TISCH



Similar documents
Agile and Secure Can We Be Both? Chicago OWASP. June 20 th, 2007

Agile and Secure: Can We Be Both?

Agile and Secure: OWASP AppSec Seattle Oct The OWASP Foundation

Secure Development LifeCycles (SDLC)

When is Agile the Best Project Management Method? Lana Tylka

Topics covered. Agile methods Plan-driven and agile development Extreme programming Agile project management Scaling agile methods

Agile Testing. Workshop. Tilo Linz, imbus AG

Application Lifecycle Management Using Visual Studio 2013 (SCRUM)

Agile Project Management By Mark C. Layton

Secure Code Development

Beyond ISO Intel's Product Security Maturity Model (PSMM)

The Agile Movement An introduction to agile software development

Project Management in Software: Origin of Agile

How To Protect Your Data From Attack

ALM2013VS_ACC: Application Lifecycle Management Using Visual Studio 2013

Effektiver Tool-Einsatz

Application Security Testing

SECURITY AND RISK MANAGEMENT

26 May 2010 CQAA Lunch & Learn Paul I. Pazderski (CSM/CSP, OD-CM, CSQA) spcinc13@yahoo.com Cell: AGILE THROUGH SCRUM

Testing in Scrum Projects

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Agile Software Engineering Practice to Improve Project Success

Agile Software Development. Stefan Balbo / Patrick Dolemieux

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Agile Project Management with Scrum

Call for Tender for Application Development and Maintenance Services

Agile Security Successful Application Security Testing for Agile Development

Agile in a Safety Critical world

Certified ScrumMaster (CSM) Content Outline and Learning Objectives January 2012

Agile extreme Development & Project Management Strategy Mentored/Component-based Workshop Series

Secure Development Lifecycle. Eoin Keary & Jim Manico

Benefits of Test Automation for Agile Testing

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Certified ScrumMaster (CSM) Content Outline and Learning Objectives January 2012

Software Development: The Next Security Frontier

Agile Processes and Methodologies: A Conceptual Study

Mariusz Chrapko. Before: Software Quality Engineer/ Agile Coach, Motorola, Poland. My Public Profile:

Introduction to Agile Software Development Process. Software Development Life Cycles

AGILE & SCRUM. Revised 9/29/2015

MM Agile: SCRUM + Automotive SPICE. Electronics Infotainment & Telematics

Bridging the Gap Between Acceptance Criteria and Definition of Done

ICAgile Learning Roadmap Agile Testing Track

How To Be Successful At An Agile Software Engineering

Maintaining Quality in Agile Environment

The Security Development Lifecycle

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden

Microsoft SDL: Agile Development

Software Engineering

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Erfolgreiche Zusammenarbeit:

An Agile Project Management Model

CHAPTER 3 : AGILE METHODOLOGIES. 3.3 Various Agile Software development methodologies. 3.4 Advantage and Disadvantage of Agile Methodology

Laboratório de Desenvolvimento de Software

Software Life Cycles and Configuration Management

Agile with XP and Scrum

The So5ware Development Process (SDLC)

Models of Software Development

Secure Programming Lecture 9: Secure Development

Agile software development

In Building Security In, Gary McGraw proposes three pillars to use throughout the lifecycle: I: Applied Risk Management

Applying Agile Project Management to a Customized Moodle Implementation

Agile Scrum Workshop

2015 Defense Health Information Technology Symposium Implementation of Agile SCRUM Software Development Methodology

Team Foundation Server

Agile and lean methods for managing application development process

Agile Development Overview

Agile Software Development compliant to Safety Standards?

Good Agile Testing Practices and Traits How does Agile Testing work?

Axe in the Agile World

SECC Agile Foundation Certificate Examination Handbook

Challenges of Software Security in Agile Software Development

A Study of RE Across Different Software Development Lifecycle Models. Afiya Nusrat and Navreet Ghag CS 846 Spring 2015

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

Scrum. SE Presentation. Anurag Dodeja Spring 2010

Continuous Delivery / Continuous Deployment How to automate your Deliveries. Bernhard Keprt

ISSECO Syllabus Public Version v1.0

Agile Testing of Business Intelligence. Cinderella 2.0

Build Your Project Using Scrum Methodology #3 of a Series, by Pavan Kumar Gorakavi, M.S., M.B.A, G.M.C.P, C.A.P.M.

Agile Requirements Engineering + LESSONS LEARNED

The traditional project management uses conventional methods in software project management process.

Experiences Linking Business Architecture with an Agile/Lean Development Method

Atomate Development Process. Quick Guide

Don't leave your Architecture Behind - Kanban-enabled Model Driven Software Development

!"#$%&'(%)*$+ :%;$)*%<&%6 4.7&68'9"/6")& 0)1.%$2.3*%./'4"55*)6 ,&+-%$+./ !"#$%&##'()*+&## Figure 1: Five OSP Dimensions

A MODEL FOR RISK MANAGEMENT IN AGILE SOFTWARE DEVELOPMENT

Scrum and Testing The end of the test role Bryan Bakker 20 maart 2012

How To Understand The Limitations Of An Agile Software Development

Revision History Revision Date Changes Initial version published to

SAS in clinical trials A relook at project management,

Continuous Integration & Automated Testing in a multisite.net/cloud Project

Issues in Internet Design and Development

Agile Testing. What Students Learn

Timebox Planning View der agile Ansatz für die visuelle Planung von System Engineering Projekt Portfolios

CS435: Introduction to Software Engineering! " Software Engineering: A Practitioner s Approach, 7/e " by Roger S. Pressman

Table of contents. Performance testing in Agile environments. Deliver quality software in less time. Business white paper

Transcription:

AGIL JA, ABER SICHER? 29.07.2015, ANDREAS FALK, 34. SCRUM TISCH

Vorstellung: Andreas Falk Langjährige Erfahrungen als Entwickler, Architekt und Tester in verschiedenen Projekten mit Fokus Enterprise-Anwendungen auf Basis von Java, Java EE / Spring in den Branchen Produktion, Logistik, Finance, Telekommunikation und Automotive Senior Consultant Seit 2011 bei der NovaTec Consulting GmbH Experte in der NovaTec Competence Group Agile Quality Engineering" Durchführung von Trainings für Java, Spring, Git, Advanced Unit-Testing und Agile (Security) Testing 2

Who s next to be hacked? 3 U.S. Office of Personnel Management

Who s next to be hacked? 5

Who s next to be hacked? 6 https://haveibeenpwned.com

Web Application Security: OWASP Top 10 (2013) https://www.owasp.org/index.php/category:owasp_top_ten_project 7

Security == Agile? Sprint 1 Sprint 2 Sprint n Story A Story B Story C Story D Story E Story F Story G Story H Security Features Penetrationtest 9

Potentially Releasable Increment? Scrum Guide: The Development Team consists of professionals who do the work of delivering a potentially releasable increment of Done product at the end of each Sprint http://www.scrumguides.org Release potentially unsecure? 10

Attacker Schedule vs. SDLC Security Test Schedule Attacker Schedule: 24h x 7d! Time Software Development Lifecycle Penetrationtest Penetrationtest 11

Microsoft Security Development Lifecycle (SDL) https://www.microsoft.com/en-us/sdl/ 13

Automotive Security Development Lifecycle (V-Model) 15

Next Stop: Secure Agile Development Process 16

Manifesto for Secure Agile Software Development 17

The Rugged Manifesto 18 https://www.ruggedsoftware.org

Microsoft Security Development Lifecycle for Agile Development Agile Process SDLC Tasks One Time Baseline thread model Estabish security response plan Regular Basis Privacy review Manual & automatic security code review Every Sprint Security training Threat modeling Secure coding Code reviews 19

OWASP Open Software Assurance Maturity Model (OpenSAMM) http://www.opensamm.org/ 20

Secure Agile Development with Scrum Daily Scrum Sprint Security Product Backlog Sprint Planning Sprint Backlog Security Sprint Review & Retro Potentially Shippable Increment Regular Security-Trainings 21

Secure Agile Development with Scrum Story A Story B Abuse Story Security Features Product Backlog Update threat model (on-going) Define abuse user stories Plan security features early Security acceptance criteria Extend Definition of Ready with security 23

Abuse (Evil) User Stories Business User Story Evil User Story 1 Evil User Story N As a customer I want to select products and add them to my shopping cart in order to buy these. As an evil user I want to manipulate requests to change prices when adding products to my shopping cart. 24

Secure Agile Development with Scrum Daily Scrum Discuss security risks (Re-)plan security tasks Sprint Update threat model (on-going) Secure coding Pair programming with security expert Security code reviews Security-Aware DoD Security (regression) testing Continuous secure delivery 25

Threat Modeling is Agile Create Production Code Make Tests Pass 6 1 Define Software- Architecture User Stories, UML Diagrams Test Driven Development (TDD) 2 Adapt Threat Model Discussion Basis Write Security Tests First 5 Create Security Testcases and Abuse User Stories 4 3 Identify and Mitigate Threats Elevation of privilege game 26

Playing games Scrum Planning Poker Threat Modeling Game 27

Commit Stage: Feedback Based Development (Static Security Testing) Continuous Integration Build & Tests & Static Code Analysis 3 Check-Out 4 & Dependency Check 2 Trigger Build 5 Report Build Result 7 Push to Stable 1 Pull-Request Developer 2 6 (Security) Code- Review Developer 1 31

Acceptance Stage Dynamic UI- and Security-Testing Security-Pipeline 3 Active Scanning 4 Reporting 1 Deploy 2 UI-Testing Proxy 33

Agile == Security! Sprint 1 Sprint 2 Sprint n Story A Story B Abuse Story Story C Story D Story E Security Features Abuse Story Story F Story G Story H Pen- Test 34

Don t make it that EASY to break software! 35