Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit...

25
Agile Application Security

Transcript of Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit...

Page 1: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Agile Application Security

Page 2: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Introduction - David Vaartjes

Now:

• Securify B.V. — Proactive Application Security

Code reviews | Security Testing | Agile Security | Design Security

Before:

• 2 jaar software security @ Rabobank (IB teams web & mobile) • 8 jaar software security @ finance, insurance, gov, retail, ..

Page 3: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

5 important rules in Agile Security.

Fit security into your dev process, not the other way around.

If security isn’t on the team’s board, it wont get done.

Involve a software security specialist. (just like UX, performance, etc.)

Only test/verify when needed. Know your risks/mitigations up front.

Agile Security != Automated security testing.

1

2

3

4

5

Page 4: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Lets make it 6.

• WF, • Agile, • DevOps, • DecDevOps, • SuperSecFastDevOps, • AwesomeSuperDevSecOpsDepMainPartey…

6

Page 5: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Lets make it 6.Businesscontext

FeaturesArchitecture

TechstackRiskprofile

ThreatModel

Non-func.Sec.Req. FunctionalSec.Req.

RiskBasedSec.Tests

We still need to do this!

Where SSD can help you!

Page 6: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

The software security dream

Page 7: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Software security dream

Page 8: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

What we still do this a lot

Page 9: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Old fashion security

Securityfocusestoomuchontestingandremainsoutofthedev.process.

Page 10: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Agile security (little, early, often)

Butshouldbeanintegratedpartoftheongoingdevandtestingofcode.

Page 11: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Security needs to change

Securitymustchangetofitthecurrentdevelopmentprocess!

Page 12: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Security, leave your comfort zone!

Don’tthrowreports,butinterfacewiththeteamandtheirtools!

Focusoncodeinsteadofpentesting.

Page 13: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

At least 10 high-risk security flaws/bugs in this code!

Page 14: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Ok nice, but what to do when?

Page 15: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Security Grooming / Requirements

Page 16: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Security Grooming / Requirements

Involveasecurityspecialistwhenfillingandprioritisingyourbacklog.

Where SSD can help you!

Page 17: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Early - Story/commit reviews

Page 18: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s
Page 19: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Support the team - be available - create awareness!

Page 20: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Sprint security sign-off (keep it simple!)

Page 21: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Sprint security sign-off (keep it simple!)

Page 22: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

��/�����&� ��!

��

��"�����$.

�� %"���'�%���

��

�*&�!�&&��&�

���+%����+�

�'�!'�&'

�%����+�

��"��������"�

���!�("!"�

����,

�#%�!'�����"�

�#%�!'�� "

���!�("!"���"!�3���

�%����+�

�#%�!'��'%".

������ ������ ����������

������� ���� ���� ������

� �������

����������

�%(���'&

0�*!("!����"��&1

���%����+�

!������%!� ���##"%'

�&�%��'"%,2..!

�#���2�..!���*%�',��&���!�

������

����

��%* ��� 0&1

��������

��&'�3

�����&��!�%.

�����������

SecurityOffice

Page 23: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

��/�����&� ��!

��

��"�����$.

�� %"���'�%���

��

�*&�!�&&��&�

���+%����+�

�'�!'�&'

�%����+�

��"��������"�

���!�("!"�

����,

�#%�!'�����"�

�#%�!'�� "

���!�("!"���"!�3���

�%����+�

�#%�!'��'%".

������ ������ ����������

������� ���� ���� ������

� �������

����������

�%(���'&

0�*!("!����"��&1

���%����+�

!������%!� ���##"%'

�&�%��'"%,2..!

�#���2�..!���*%�',��&���!�

������

����

��%* ��� 0&1

��������

��&'�3

�����&��!�%.

�����������

SecurityOffice

</>

Page 24: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Security automation can support you (~20%)

</>

OWASPZAPSecurityTests(dynamic)

CucumberSecTests(dynamic)

CodeChecks(static)

Page 25: Agile Application Security - Agile Security.pdf · 5 important rules in Agile Security. Fit security into your dev process, not the other way around. If security isn’t on the team’s

Bedankt!

@securifybv [email protected]