s ecurity and r isk m anagement
play

S ECURITY AND R ISK M ANAGEMENT IN A GILE S OFTWARE D EVELOPMENT - PowerPoint PPT Presentation

S ECURITY AND R ISK M ANAGEMENT IN A GILE S OFTWARE D EVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12 # WHOAMI Security Architect @ Financial Services Organization Location: Austin, TX Certified


  1. S ECURITY AND R ISK M ANAGEMENT IN A GILE S OFTWARE D EVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12

  2. # WHOAMI  Security Architect @ Financial Services Organization  Location: Austin, TX  Certified Scrum Master  TOGAF 9 Certified Architect  Co- Author: “Spring Roo in Action” Book  Editor (InfoQ.com) 2

  3. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 3

  4. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 4

  5. P ROGRAM  Goals:  Security & Risk Management at Enterprise level  Build Security In  Sustainable Compliance  Risk based Security Architecture Strategy  Architecture Framework  Process 5

  6. O RGANIZATIONAL A GILITY  Vertical:  Strategy  Portfolio  Project  Release  Iteration/Sprint  Daily Sprints  Horizontal:  Process  People  Tools/Technologies 6 Source: VersionOne

  7. S ECURITY ARCHITECTURE P ROGRAM Strategy Communication Initiatives / Framework Process Plan / Metrics Engagements Stakeholder Disciplines Projects Matrix CoE Team Components R&D 7 Activities

  8. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 8

  9. F RAMEWORK  Defines “Structure” and “Lifecycle” of the Architecture Strategy  Structure: Framework Components  Structure:  Disciplines  Components  Activities  Lifecycle: Process Activities  Components’ mapping with Process Activities 9

  10. R EFERENCE F RAMEWORKS NIST 800-53 FISMA TOGAF 9 Microsoft Secure Development BSIMM SAFECode Lifecycle (SDL) OWASP Standards 10

  11. D ISCIPLINES Identity and Security Security Access Assessment & Architecture & Management Authorization Design (IAM) System & Systems & Information Communications SIEM Integrity Protection Technologies Governance and Tools 11

  12. C OMPONENTS Identification Risk Threat and Assessment Modeling Authentication Application Technologies Data Security Security and Tools Standards and R&D Best Practices 12

  13. D ISCIPLINES V . C OMPONENTS Security Assessment • Risk Assessment & Authorization • Regulatory Compliance • Threat Modeling Architecture and • Reference Architecture and RI Design • Model Driven Security • Identification and Authentication Identity and Access • Access Control Management • ESSO • Data Security System and • Encryption Information Integrity • Application Security • Standards and Best Practices Governance • Reviews (Architecture, Design and Code) 13 • R&D

  14. S TANDARDS  Standards at all levels of product development  Architecture  Design & Coding (based on OWASP Standards)  Technologies & Tools  Standards Enforcement  Automatic scans  Manual Reviews  Lifecycle:  Identify exceptions/waivers at beginning of project  Continuous feedback to refine standards (via Agile retrospectives) 14

  15. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 15

  16. A RCHITECTURE L IFECYCLE P ROCESS  Integrate security risk assessment and management into all phases of product development  Security touch-points with PMLC & SDLC processes  Reviews to ensure architecture compliance  Reviews v. Sign-offs 16

  17. P RODUCT LIFECYCLE (PMLC) Product Vision Support & Inception Maintenan ce Implemen Architectu tation re Design & Testing Developme 17 nt

  18. PMLC W/ S ECURITY TOUCHPOINTS Product Vision Support Risk & Assessme Maintena nt nce Inceptio Security Sign-off n Security Architect Impleme ure ntation Assessme nt Security Architect Architect ure ure Review Design & 18 Developm ent

  19. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 19

  20. A SSESSMENTS AND R EVIEWS Product Vision Risk Assessment Initial Check Privacy/ Info Security Initial Check Product Initiation Assessment Security Architecture Architecture Design & Development Review Design & Development Security Code Review Functional Testing Security Architecture Functional Testing Performance Testing Impl Review Final Security Review Performance Testing Implementation and Sign-off 20

  21. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 21

  22. C ENTERS OF E XCELLENCE  Cross-team Security Architecture and Risk Management group  Champion the management and governance of all aspects of security architecture program  Core and Extended Teams  Application, Security and Data  Business and Technology 22

  23. C O E C HARTER  Risk Assessments  Security Architecture and Design Consulting  Communicate architecture decisions & guidelines to project teams  Review & present security architecture related proposals to ARB  Escalate critical security issues  Awareness & Education (via Newsletters, Wiki, Brown Bag sessions)  Security Training  Security Reviews (Architecture, Design, and Development)  Threat Modeling (Future)  Guidance on Code Scans, Pre-deployment Scans & Penetration Testing  Assist in product development and product acquisition 23

  24. E NGAGEMENTS  Collaboration between team members  Communication at the right places in the process  Security requirements & test cases during Sprint Planning  Security architecture walk-throughs  Architecture retrospectives (end of sprint)  Projects, Initiatives, Ad-Hoc Consulting  Governance Model  Research Labs (for R&D) 24

  25. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 25

  26. T RAINING AND A WARENESS  Education focused - Learning v. Teaching  Stakeholder specific  Business Analyst, Product / Project Manager  QA Testing Engineer  Technical Lead, Developer  DBA, Network Admin  Topic/Module Specific  Requirements Management  Testing and Validation  Development: User Interface, Services, Data, SQL Injection, XSS  Internal & External; Online & Classroom based 26

  27. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 27

  28. L ESSONS L EARNED  Manual architecture, design and code reviews  Solution: Automated Static & Dynamic Code Analysis Tool  Skill set challenges  Solution: Enhancements to training program  Assessments overhead  Solution: Refinements based on project experience 28

  29. R OADMAP  Current State: 2+ yrs since the start (3 yrs effort at the previous organization)  Threat Modeling (Agile Version)  Security & risk management aspects in:  Social Computing *  Mobile Development *  Cloud Computing  NoSQL Databases 29 * In progress

  30. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 30

  31. C ONCLUSIONS  Get commitment from Senior Mgmt. team  Get involved in the strategic planning process  Process and Standards are critical  Automate the process as much as possible  Agile governance model  Community of best practices (CoE)  “Agile or Security” v. “Agile and Security”  “One Size Fits All” fits nothing 31

  32. R ESOURCES  Agile Threat Modeling (http://www.infoq.com/articles/threat-modeling-express)  TOGAF  SABSA  The Building Security In Maturity Model (BSIMM) (http://bsimm.com)  Software Security: Building Security In by Gary McGraw  Secure Programming with Static Analysis by Brian Chess and Jacob West  Security Metrics (http://www.securitymetrics.org/content/Wiki.jsp) 32

  33. T HANK Y OU  Contact Information  http://www.infoq.com/author/Srini-Penchikala  srinipenchikala@gmail.com  @srinip  http://srinip2007.blogspot.com  Spring Roo in Action Book  Questions? 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend