DevSecOpsDays Pittsburgh 2020
Security is an Awesome Product Feature
Mark P. Hahn
Director of Cloud Strategies and DevOps Ciber Global, LLC, an HTC Global Company
425-749-9501, mhahn@ciber.com, https://www.linkedin.com/in/markphahn/
Security is an Awesome Product Feature Mark P. Hahn Director of - - PowerPoint PPT Presentation
Security is an Awesome Product Feature Mark P. Hahn Director of Cloud Strategies and DevOps Ciber Global, LLC , an HTC Global Company 425-749-9501, mhahn@ciber.com, https://www.linkedin.com/in/markphahn/ DevSecOpsDays Pittsburgh 2020 This
DevSecOpsDays Pittsburgh 2020
Director of Cloud Strategies and DevOps Ciber Global, LLC, an HTC Global Company
425-749-9501, mhahn@ciber.com, https://www.linkedin.com/in/markphahn/
DevSecOpsDays Pittsburgh 2020
Director of Cloud Strategies and DevOps Ciber Global, LLC, an HTC Global Company
425-749-9501, mhahn@ciber.com, https://www.linkedin.com/in/markphahn/
This talk was presented at DevSecOpsDays in July of 2020
https://devsecopsdayspittsburgh2020.sched.com/
The event was hosted by the Software Engineering Institute at CMU
https://www.sei.cmu.edu/ These are the annotated slides with my speaker notes to make it readable as a standalone document. Additional references are also included.
Mark Hahn is Ciber's Practice Director for Cloud and Dev/Ops
delivering large-scale systems, including Wall Street trading systems, multinational retail payments systems and supply chain systems. Mark practices and coaches continuous delivery techniques that improve delivery timelines and increase system reliability, including Lean software development and continuous improvement. A rare high-level professional who maintains excellent hands-on technical proficiency, Mark has been with Ciber for 8 years.
DevSecOpsDays Pittsburgh 2020
https://brakeingsecurity.com/2019-044-noid-and-dave-dittrich-discusses-recent-keybase-woes-part-1
DevSecOpsDays Pittsburgh 2020
https://brakeingsecurity.com/2019-044-noid-and-dave-dittrich-discusses-recent-keybase-woes-part-1
The origin for this talk was this quote from the Brakeing Down Security podcast in December 2019 by Brian ”@Noid” Harden. Brian had recently given a presentation at Seattle BSides about how to find security champions in development teams so one person on the team understands the concerns of the information security team. My thought was that the whole development team should understand that security is an awesome feature. In fact, it is the development team’s responsibility to lead the charge for security in their product. Empowered DevOps teams should not only be responsible for creating viable features, they are also responsible for product stability and
first class product feature.
DevSecOpsDays Pittsburgh 2020
DevSecOpsDays Pittsburgh 2020
The word “awesome” is an adjective for comparison, which implies that we are making a choice about relative value of something. In this case it is the relative value of working on application security versus work on some
DevSecOpsDays Pittsburgh 2020
Plan Build Monitor Deploy Test
Continuous Integration
DevOps Toolchain DevSecOps Toolchain
Create Plan Configure Detect Verify Preproduction Predict Respond Continuous Continuous Improvement Configuration Continuous Continuous Deployment Learning Continuous Monitoring Continuous Integration Monitoring And Analytics Monitoring And Analytics
DevSecOpsDays Pittsburgh 2020
Plan Build Monitor Deploy Test
Continuous Integration
DevOps Toolchain DevSecOps Toolchain
Create Plan Configure Detect Verify Preproduction Predict Respond Continuous Continuous Improvement Configuration Continuous Continuous Deployment Learning Continuous Monitoring Continuous Integration Monitoring And Analytics Monitoring And Analytics
The reason for the product is to create some business value for an
methods) for focusing on business value and agreeing on a set of work to create or enhance business value. Which ever model you use for managing your work, the key is the value that the organization derives. I prefer the simpler wheel on the right over the more complex models
wheel to deliver running software, and working on security features are simply circuits around the wheel.
DevSecOpsDays Pittsburgh 2020
Plan Build Monitor Deploy Test
Continuous Integration
DevSecOpsDays Pittsburgh 2020
Plan Build Monitor Deploy Test
Continuous Integration
Development teams working to deliver business value must recognize that “Cybersecurity is a business problem, not a technical problem.” That phrase is the title of the first chapter in the book Fire Doesn’t Innovate by Kip Boyle, ISBN-10: 1544513194.
DevSecOpsDays Pittsburgh 2020
PO DL DV DV DV DV DV EC VP DR US US US IA CP SA SR T1 OP PM BA PD Senior Leadership Business Owners End Users SRE and Operations Information Security
DevSecOpsDays Pittsburgh 2020
PO DL DV DV DV DV DV EC VP DR US US US IA CP SA SR T1 OP PM BA PD Senior Leadership Business Owners End Users SRE and Operations Information Security
Development teams need to evaluate the input and needs of many different constituencies when ranking security features versus business features. This is a negotiation process which developments may not be good at. The tool that teams can use to risk modeling and threat analysis to help quality and then quantify the security risk to their system. The book Threat Modeling: Designing for Security by Adam Shostack, ISBN: 9781118809990 is a good staring point. The STRIDE model provides a workable starting point for analysis that can easily be used by development teams. EC = Executive VP = Vice President DR = Director PM = Product Management BA = Business Analyst PD = Product Designer US = User SR = SRE T1= Tier 1 OP = Operations IA = InfoSec Analyst CP = Compliance SA = Security Analyst
DevSecOpsDays Pittsburgh 2020
DevSecOpsDays Pittsburgh 2020
One way to set priorities is to use a qualitative ranking and make judgements between different features. The quality descriptors can
and rank security risks, and choose mitigations to work on. However, the qualitive rankings for security may be difficult to compare to the qualifiers used to describe and rank business features.
DevSecOpsDays Pittsburgh 2020
Average Cost of a data breach
Average size of a data breach
Cost per lost record
Time to identify and contain a data breach
($2,500 pre consumer) + Lawsuits
DevSecOpsDays Pittsburgh 2020
Average Cost of a data breach
Average size of a data breach
Cost per lost record
Time to identify and contain a data breach
($2,500 pre consumer) + Lawsuits
Another way to set priorities is to use a monetary evaluation to compare to business features which have monetary models. This can prove difficult however, when deciding
which are now making headlines. Such a large value looks like it trumps all other concerns. But it also can make the conversations uncomfortable.
DevSecOpsDays Pittsburgh 2020
DevSecOpsDays Pittsburgh 2020
This is from a Gartner report entitled 12 Things to Get Right for Successful DevSecOps, Published: 19 December 2019, ID: G00450792. That report also contains the DevSecOps diagram shown on a preceding slide.
DevSecOpsDays Pittsburgh 2020
Governance Design Implementation Verification Operations Strategy and Metrics Threat Assessment Secure Build Architecture Assessment Incident Management Policy and Compliance Security Requirements Secure Deployment Requirements- driven Testing Environment Management Education and Guidance Security Architecture Defect Management Security Testing Operational Management
DevSecOpsDays Pittsburgh 2020
Governance Design Implementation Verification Operations Strategy and Metrics Threat Assessment Secure Build Architecture Assessment Incident Management Policy and Compliance Security Requirements Secure Deployment Requirements- driven Testing Environment Management Education and Guidance Security Architecture Defect Management Security Testing Operational Management
This is from the open source OpenSAMM project from OWASP. See https://owasp.org/www- project-samm/ and https://owaspsamm.org/. OpenSAMM contains a lot of good advice about what to do for security, but less information on how to do it. That’s a discussion for another presentation.
DevSecOpsDays Pittsburgh 2020
Secure Architecture Automated Repeatable Builds Capacity and Stress Testing Environment Hardening Event Rates
Risk Modeling Software Supply Chain Analysis Static Application Security Testing Automated Infrastructure as Code Attack Surface
Threat Assessment Container Scanning Fuzz / Chaos Testing Canary Deployments Incident Response
DevSecOpsDays Pittsburgh 2020
Secure Architecture Automated Repeatable Builds Capacity and Stress Testing Environment Hardening Event Rates
Risk Modeling Software Supply Chain Analysis Static Application Security Testing Automated Infrastructure as Code Attack Surface
Threat Assessment Container Scanning Fuzz / Chaos Testing Canary Deployments Incident Response
My recommendation is that teams adopt an agile iterative approach. While there are lot of different security features you should add, they can be ranked and included as the product lifecycle plays out. Also, many of these security features are also excellent business features. For example, monitoring event rates is good for both security and for product management.
DevSecOpsDays Pittsburgh 2020
DevSecOpsDays Pittsburgh 2020
If a client, or user, cannot trust the system to prevent their data from being exposed, then they will likely find a different product to use. Conversely, if a product demonstrates strong security features, then clients and users will choose that system over others that are less secure.
DevSecOpsDays Pittsburgh 2020
DevSecOpsDays Pittsburgh 2020
This was the nifty break slide created during my presentation by an in-house sketch artist.
DevSecOpsDays Pittsburgh 2020
www.htcinc.com www.caretech.com www.ciber.com Headquarters
3270 West Big Beaver Road Troy, MI 48084, U.S.A Phone: 248.786.2500 Toll-free: 833-609-4950
Reimagine technology to accelerate your business