Globalcode – Open4education
Implementing Security into Agile SDLC
Anderson Dadario, CISSP, CSSLP Flare Security
Implementing Security into Agile SDLC Anderson Dadario, CISSP, CSSLP - - PowerPoint PPT Presentation
Implementing Security into Agile SDLC Anderson Dadario, CISSP, CSSLP Flare Security Globalcode O pen4education # whoami Anderson Dadario Consultant at Flare Security 5+ years working with development & infosec Globalcode
Globalcode – Open4education
Implementing Security into Agile SDLC
Anderson Dadario, CISSP, CSSLP Flare Security
Globalcode – Open4education # whoami
Globalcode – Open4education What you will learn
Globalcode – Open4education What’s your security program?
Globalcode – Open4education Motivations for Secure SDLC (1-2)
http://www.microsoft.com/security/sdl/about/benefits.aspx
Globalcode – Open4education Motivations for Secure SDLC (2-2)
https://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf
Globalcode – Open4education Waterfall Methodology
Globalcode – Open4education Waterfall Characteristics
the CCB (Change Control Board) approves them.
Globalcode – Open4education
Business Analyst Product Manager Development Manager Developer Project Manager Offshoring
Waterfall in the Real World
Globalcode – Open4education It’s time to ...
Globalcode – Open4education Waterfall Security Awareness
Globalcode – Open4education
Business Analyst Product Manager Development Manager Developer Project Manager Offshoring
Waterfall in the Real World
Globalcode – Open4education Waterfall Security Characteristics
Globalcode – Open4education
Globalcode – Open4education Scrum Roles
Globalcode – Open4education Scrum Artifacts
Burndown Chart
Globalcode – Open4education Scrum Ceremonies
Globalcode – Open4education It’s time to ….
Globalcode – Open4education But first keep these points in mind
Globalcode – Open4education The Rugged Manifesto
Globalcode – Open4education Strategy #1 Participate in everything
Globalcode – Open4education
Pros:
aware of the project and can rapidly inject security:
during the ceremonies.
Cons:
much consumed;
the part a waste of time;
troublesome.
Strategy #1 Analysis
Globalcode – Open4education Post-Planning Strategy #2 Post-Planning, ‘Dailyless’
Globalcode – Open4education
Pros:
wisely.
Cons:
methodology because stories cannot change after planning;
Strategy #2 Analysis
Globalcode – Open4education Grooming
Security Architect Security Engineer
Strategy #3 Grooming, Security Roles
Globalcode – Open4education
Pros:
wisely;
the development process.
Cons:
the security injection become more complex.
Strategy #3 Analysis
Globalcode – Open4education
This ain’t over. What about ...
Globalcode – Open4education
Stories that are created after the planning
Globalcode – Open4education
Security stories negotiation
Globalcode – Open4education
Risk Management (1-3)
Globalcode – Open4education
Risk Management (2-3)
Globalcode – Open4education
Threat Model Case #ID 05 Asset User Credentials Threat Threat action aimed to illegally access and use another user's credentials, such as username and password. Risk High Threat Agent External Attacker Threat Type (STRIDE) Spoofing Security Control Authentication Mitigation Controls
Incident Response Procedures Block user account, revoke password, etc
Risk Management (3-3)
Globalcode – Open4education
Maximize even more the Security Injection
Globalcode – Open4education OpenSAMM (1-2)
Globalcode – Open4education OpenSAMM (2-2)
Globalcode – Open4education Final Thoughts
they will respect yours;
how you can tweak your process to make it better;
software since there is no silver bullet.
Globalcode – Open4education
References & Resources
Globalcode – Open4education
Anderson Dadario, CISSP, CSSLP http://dadario.com.br http://flaresecurity.com