s ecurity and r isk m anagement
play

S ECURITY AND R ISK M ANAGEMENT IN A GILE S OFTWARE D EVELOPMENT - PowerPoint PPT Presentation

S ECURITY AND R ISK M ANAGEMENT IN A GILE S OFTWARE D EVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12 # WHOAMI Security Architect @ Financial Services Organization Location: Austin, TX Certified


  1. S ECURITY AND R ISK M ANAGEMENT IN A GILE S OFTWARE D EVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12

  2. # WHOAMI  Security Architect @ Financial Services Organization  Location: Austin, TX  Certified Scrum Master  TOGAF 9 Certified Architect  Co- Author: “Spring Roo in Action” Book  Editor (InfoQ.com) 2

  3. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 3

  4. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 4

  5. P ROGRAM  Goals:  Security & Risk Management at Enterprise level  Build Security In  Sustainable Compliance  Risk based Security Architecture Strategy  Architecture Framework  Process 5

  6. O RGANIZATIONAL A GILITY  Vertical:  Strategy  Portfolio  Project  Release  Iteration/Sprint  Daily Sprints  Horizontal:  Process  People  Tools/Technologies 6 Source: VersionOne

  7. S ECURITY ARCHITECTURE P ROGRAM Strategy Communication Initiatives / Framework Process Plan / Metrics Engagements Stakeholder Disciplines Projects Matrix CoE Team Components R&D 7 Activities

  8. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 8

  9. F RAMEWORK  Defines “Structure” and “Lifecycle” of the Architecture Strategy  Structure: Framework Components  Structure:  Disciplines  Components  Activities  Lifecycle: Process Activities  Components’ mapping with Process Activities 9

  10. R EFERENCE F RAMEWORKS NIST 800-53 FISMA TOGAF 9 Microsoft Secure Development BSIMM SAFECode Lifecycle (SDL) OWASP Standards 10

  11. D ISCIPLINES Identity and Security Security Access Assessment & Architecture & Management Authorization Design (IAM) System & Systems & Information Communications SIEM Integrity Protection Technologies Governance and Tools 11

  12. C OMPONENTS Identification Risk Threat and Assessment Modeling Authentication Application Technologies Data Security Security and Tools Standards and R&D Best Practices 12

  13. D ISCIPLINES V . C OMPONENTS Security Assessment • Risk Assessment & Authorization • Regulatory Compliance • Threat Modeling Architecture and • Reference Architecture and RI Design • Model Driven Security • Identification and Authentication Identity and Access • Access Control Management • ESSO • Data Security System and • Encryption Information Integrity • Application Security • Standards and Best Practices Governance • Reviews (Architecture, Design and Code) 13 • R&D

  14. S TANDARDS  Standards at all levels of product development  Architecture  Design & Coding (based on OWASP Standards)  Technologies & Tools  Standards Enforcement  Automatic scans  Manual Reviews  Lifecycle:  Identify exceptions/waivers at beginning of project  Continuous feedback to refine standards (via Agile retrospectives) 14

  15. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 15

  16. A RCHITECTURE L IFECYCLE P ROCESS  Integrate security risk assessment and management into all phases of product development  Security touch-points with PMLC & SDLC processes  Reviews to ensure architecture compliance  Reviews v. Sign-offs 16

  17. P RODUCT LIFECYCLE (PMLC) Product Vision Support & Inception Maintenan ce Implemen Architectu tation re Design & Testing Developme 17 nt

  18. PMLC W/ S ECURITY TOUCHPOINTS Product Vision Support Risk & Assessme Maintena nt nce Inceptio Security Sign-off n Security Architect Impleme ure ntation Assessme nt Security Architect Architect ure ure Review Design & 18 Developm ent

  19. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 19

  20. A SSESSMENTS AND R EVIEWS Product Vision Risk Assessment Initial Check Privacy/ Info Security Initial Check Product Initiation Assessment Security Architecture Architecture Design & Development Review Design & Development Security Code Review Functional Testing Security Architecture Functional Testing Performance Testing Impl Review Final Security Review Performance Testing Implementation and Sign-off 20

  21. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 21

  22. C ENTERS OF E XCELLENCE  Cross-team Security Architecture and Risk Management group  Champion the management and governance of all aspects of security architecture program  Core and Extended Teams  Application, Security and Data  Business and Technology 22

  23. C O E C HARTER  Risk Assessments  Security Architecture and Design Consulting  Communicate architecture decisions & guidelines to project teams  Review & present security architecture related proposals to ARB  Escalate critical security issues  Awareness & Education (via Newsletters, Wiki, Brown Bag sessions)  Security Training  Security Reviews (Architecture, Design, and Development)  Threat Modeling (Future)  Guidance on Code Scans, Pre-deployment Scans & Penetration Testing  Assist in product development and product acquisition 23

  24. E NGAGEMENTS  Collaboration between team members  Communication at the right places in the process  Security requirements & test cases during Sprint Planning  Security architecture walk-throughs  Architecture retrospectives (end of sprint)  Projects, Initiatives, Ad-Hoc Consulting  Governance Model  Research Labs (for R&D) 24

  25. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 25

  26. T RAINING AND A WARENESS  Education focused - Learning v. Teaching  Stakeholder specific  Business Analyst, Product / Project Manager  QA Testing Engineer  Technical Lead, Developer  DBA, Network Admin  Topic/Module Specific  Requirements Management  Testing and Validation  Development: User Interface, Services, Data, SQL Injection, XSS  Internal & External; Online & Classroom based 26

  27. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 27

  28. L ESSONS L EARNED  Manual architecture, design and code reviews  Solution: Automated Static & Dynamic Code Analysis Tool  Skill set challenges  Solution: Enhancements to training program  Assessments overhead  Solution: Refinements based on project experience 28

  29. R OADMAP  Current State: 2+ yrs since the start (3 yrs effort at the previous organization)  Threat Modeling (Agile Version)  Security & risk management aspects in:  Social Computing *  Mobile Development *  Cloud Computing  NoSQL Databases 29 * In progress

  30. A GENDA  Security Architecture Program  Architecture Strategy and Framework  Development Process Changes  Security and Risk Assessments  Architecture Centers of Excellence  Training and Awareness  Lessons Learned  Conclusions 30

  31. C ONCLUSIONS  Get commitment from Senior Mgmt. team  Get involved in the strategic planning process  Process and Standards are critical  Automate the process as much as possible  Agile governance model  Community of best practices (CoE)  “Agile or Security” v. “Agile and Security”  “One Size Fits All” fits nothing 31

  32. R ESOURCES  Agile Threat Modeling (http://www.infoq.com/articles/threat-modeling-express)  TOGAF  SABSA  The Building Security In Maturity Model (BSIMM) (http://bsimm.com)  Software Security: Building Security In by Gary McGraw  Secure Programming with Static Analysis by Brian Chess and Jacob West  Security Metrics (http://www.securitymetrics.org/content/Wiki.jsp) 32

  33. T HANK Y OU  Contact Information  http://www.infoq.com/author/Srini-Penchikala  srinipenchikala@gmail.com  @srinip  http://srinip2007.blogspot.com  Spring Roo in Action Book  Questions? 33

Recommend


More recommend