SlideShare a Scribd company logo
D o u b l e - c l i c k t o e d i t
SECURITY IN AGILE TEAMS
Maria Gomez
@mariascandella
Barcelona June 2017
Developer
Architect
Coach
Tech lead
Speaker
Security Expert
Developer
Architect
Coach
Tech lead
Speaker
Security Expert
With great power
comes great responsibility
“
— uncle Ben
https://flic.kr/p/5UDwbm
https://flic.kr/p/c12Ad
We could do better
Security in agile teams
BENEFITS
• Higher confidence
• Evolutionary model
• Better testing and planning
• Faster reaction to making improvements or fixes 
Security in agile teams
INCEPTION
WHAT’S THE CURRENT STATE?
• List of existing systems/applications as well as their users.
• Review of past incidents/attacks
• Review of existing security policies and how they will impact
the scope of the project
WHAT WILL BE BUILT?
WHAT IS THE CURRENT THREAT LANDSCAPE? 
https://www.owasp.org/index.php/Application_Threat_Modeling
DELIVERY
SECURITY CHECKLIST
• Secret Management tool for the team
• Password Manager
• Keep secrets out of source control
• Dependency checker for the CI/CD pipeline
• Static analysis tools
Cade Cairns - Security Playbook (https://github.com/cairnsc/security-playbook)
READY FOR DEV
• Identify security requirements
• Introduce acceptance criteria
Given an unauthenticated user enters the system
When she tries to view her profile
Then she is redirected to the login page
#0
IN DEV
IN QA
The system meets the acceptance criteria
CFRs have been taken into account and implemented as part of the
story, if necessary
Established code conventions have been met
Check against attack trees
IN PROD
Incident Report Plan
CONTINUOUS IMPROVEMENT
Given an unauthenticated user enters the
system
When she tries to view her profile
Then she is redirected to the login page
#
Security in agile teams
REFERENCES
https://www.thoughtworks.com/insights/blog/incorporating-security-best-
practices-agile-teams
https://github.com/cairnsc/security-playbook
https://martinfowler.com/articles/web-security-basics.html
https://www.owasp.org/index.php/Main_Page
@mariascandella
THANKS!

More Related Content

PDF
Security in agile teams
PDF
Why does security matter for devops by Caroline Wong
PPTX
The road goes ever on and on by Ciaran Conliffe
PPTX
DEVSECOPS: Coding DevSecOps journey
PDF
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
PPTX
The Journey to DevSecOps
PPTX
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
PDF
RSAC DevSecOpsDays 2018 - We are all Equifax
Security in agile teams
Why does security matter for devops by Caroline Wong
The road goes ever on and on by Ciaran Conliffe
DEVSECOPS: Coding DevSecOps journey
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
The Journey to DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
RSAC DevSecOpsDays 2018 - We are all Equifax

What's hot (20)

PDF
Mobile Application Security Threats through the Eyes of the Attacker
PPTX
The path of secure software by Katy Anton
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Getting to Know Security and Devs: Keys to Successful DevSecOps
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PDF
Top 5 Data Security Strategies in QA
PPTX
Cybersecurity is the Future of Computing
PDF
Secure Software Development Lifecycle - Devoxx MA 2018
PPTX
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
PDF
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
PPTX
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
PDF
Building Security Controls around Attack Models
PDF
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
PDF
Tackling the Container Iceberg:How to approach security when most of your sof...
PPTX
Perforce on Tour 2015 - How are You Protecting Your Source Code?
PPTX
Outpost24 Webinar - Five steps to build a killer Application Security Program
PDF
Chaos monitoring
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
PDF
Estimating Development Security Maturity in About an Hour
Mobile Application Security Threats through the Eyes of the Attacker
The path of secure software by Katy Anton
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Getting to Know Security and Devs: Keys to Successful DevSecOps
Outpost24 Webinar - Creating a sustainable application security program to dr...
Top 5 Data Security Strategies in QA
Cybersecurity is the Future of Computing
Secure Software Development Lifecycle - Devoxx MA 2018
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Building Security Controls around Attack Models
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
Tackling the Container Iceberg:How to approach security when most of your sof...
Perforce on Tour 2015 - How are You Protecting Your Source Code?
Outpost24 Webinar - Five steps to build a killer Application Security Program
Chaos monitoring
Journey to the Cloud: Securing Your AWS Applications - April 2015
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
Estimating Development Security Maturity in About an Hour
Ad

Similar to Security in agile teams (20)

PDF
Security in a Continuous Delivery World
PDF
Security in a Continuous Delivery World - 2015 - Sherif Mansour
PPTX
Agile security
PPTX
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PDF
Defense-Oriented DevOps for Modern Software Development
PDF
Defense-Oriented DevOps for Modern Software Development
PPTX
Security Champions - Introduce them in your Organisation
PDF
[AKC2021] SAFe case study digital experience(Pete Rim)
PDF
BSides Vienna 2015
PDF
Owasp summit debrief v1.0 (jun 2017)
PDF
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
PDF
Agile Secure Development
PDF
Building Security Teams
PDF
The Path of DevOps Enlightenment for InfoSec
PPTX
BSidesSF talk: Overcoming obstacles in operationalizing security
PPT
Cyber Security integration
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
Shift Left Security – Guidance on embedding security for a Digital Transforma...
PPTX
Owasp summit slides day 2
Security in a Continuous Delivery World
Security in a Continuous Delivery World - 2015 - Sherif Mansour
Agile security
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
Succeeding-Marriage-Cybersecurity-DevOps final
Defense-Oriented DevOps for Modern Software Development
Defense-Oriented DevOps for Modern Software Development
Security Champions - Introduce them in your Organisation
[AKC2021] SAFe case study digital experience(Pete Rim)
BSides Vienna 2015
Owasp summit debrief v1.0 (jun 2017)
Innotech Austin 2017: The Path of DevOps Enlightenment for InfoSec
Agile Secure Development
Building Security Teams
The Path of DevOps Enlightenment for InfoSec
BSidesSF talk: Overcoming obstacles in operationalizing security
Cyber Security integration
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Owasp summit slides day 2
Ad

More from Maria Gomez (19)

PPTX
From Monolith to Observable Microservices using DDD
PDF
CQRS and Event Sourcing: A DevOps perspective
PDF
Splitting the monolith using Domain Driven Design
PDF
Observable Microservices (O'Reilly SACon London 2018)
PPTX
Effective team onboarding
PDF
Observable microservices (O'Reilly SACon NY 2018)
PDF
Observable Microservices
PDF
Splitting the Monolith
PDF
Taller de Refactorización (Campus Party Quito 2014)
PDF
Refactoring workshop (Campus Party Quito 2014)
PDF
Project Management - Report
PDF
Principles of New Media - Essay
PDF
Project Management - Risk management
PPTX
Responsive Environments - MoodMixer Presentation
PDF
Responsive Environments - Critical report
PDF
New Media Management - Gantt chart
PDF
New Media Management - Project plan
PPTX
New Media Management - Presentation
PDF
New Media Management - Report
From Monolith to Observable Microservices using DDD
CQRS and Event Sourcing: A DevOps perspective
Splitting the monolith using Domain Driven Design
Observable Microservices (O'Reilly SACon London 2018)
Effective team onboarding
Observable microservices (O'Reilly SACon NY 2018)
Observable Microservices
Splitting the Monolith
Taller de Refactorización (Campus Party Quito 2014)
Refactoring workshop (Campus Party Quito 2014)
Project Management - Report
Principles of New Media - Essay
Project Management - Risk management
Responsive Environments - MoodMixer Presentation
Responsive Environments - Critical report
New Media Management - Gantt chart
New Media Management - Project plan
New Media Management - Presentation
New Media Management - Report

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Accuracy of neural networks in brain wave diagnosis of schizophrenia
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation_ Review paper, used for researhc scholars
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks

Security in agile teams