SlideShare a Scribd company logo
SARAJEVO, 27.10.2014 
Agile Secure Development 
Petter Sandholdt 
-How to make the agile team work with security requirements
Who am I? 
Petter Sandholdt 
-Senior Developer 
-Senior Security Consultant 
-Java, C, C++, C#, Cocoa, Erlang, PHP, Pike, Ruby, Cobol, Fortran, Lisp 
-Security in R&D for last 6 years 
... in agile teams the last 5 years
Easy targets 
Verizon Enterprise’s 2013 Data Breach Investigations Report 
●47,000reported security incidents, 
●621confirmed data security breaches 
●companies of all sizes. 
http://www.verizonenterprise.com/DBIR/2013/ 
78% of successful security intrusions were simple to pull off
What do Dev and SO think? 
http://www.pcadvisor.co.uk/news/network-wifi/3345773/developers-say-application-security-lacking/#ixzz2Vj0QCALy 
Developers 
Security Officers 
Security of applications is not addressed 
There is no build security in process SSDLC 
Application had a security breach during the past 2 years 
Did not receive software and application security training 
Application meets security regulations 
70% 
50% 
80% 
64% 
68% 
47% 
50% 
50% 
15% 
12%
Agile application ≠ Secure? 
Agile moto: 
●Do what’s in the sprint 
XP moto: 
●Never do more that what’s required 
TDD moto: 
●Code until its green
Agile application = Secure? 
REQS 
CODE
Agile application = Secure? 
CODE 
REQS 
NOT TESTED
When is an application secure? 
●Requires hard-to-guess passwords? 
●Has input validation? 
●Has up-to-date and hardened 3rd-party libraries? 
●The one that fulfills the security requirementsof the application
How can the POs know about security? 
POs are OWNERSin that role decide what is important for this application. 
●Deployability (Architects or Operations) 
●Performance (Architects,Testers & DBA) 
●How to code it (Developers)
Secure Software Development Life Cycles 
●Microsoft SDL 
●Adobe SPLC 
●CLASP 
●Cigital Touchpoints
Secure Coding in 5 minutes 
1.Take Responsibility 
2.Never trust data 
3.Create a threat model 
4.Keep yourself updated 
5.Make a fuzz 
6.Stay proud of your code 
7.Use the best tools 
http://bit.ly/1dZ6fwA
Recipe that works! 
1.Architecture Overview 
2.Have threat modelling sessions 
3.Review all new requirements/stories 
4.Fix your tools to help you 
5.Add YOUR activities to sprint
1. Architecture overview
1. Architecture overview 
Image from: http://msdn.microsoft.com/en-us/library/ff649779.aspx
Data-Flow-Diagrams are great
Agile??? 
WTF! More artifacts! Not on my watch! 
-Helps collaboration-Find discrepancies-Creates ONE terminology
2. Threat Modeling session 
●First session 
○Brainstorming 
●Following sessions 
○Discussions aroundadded entities
2. Threat Modeling session 
Threat 
Property we want 
Spoofing 
Authentication 
Tampering 
Integrity 
Repudiation 
Non-repudiation 
Information Disclosure 
Confidenciality 
Denial of Service 
Authentification 
Elevation of Privilege 
Authorization
Threat Modeling session 
Elevation of Privilege (EoP) Card Game
3. Backlog Review 
Look at the backlog from a security perspective 
Security Expert (from team) and PO 
Create checklist to facilitate
3. Checklist Example 
●How will this new functionality be accessed? 
●Can this affect “protected identites”? 
●New entites in theatmodel require adding a new theatmodel session 
●New role of users needs new validations on each resource 
●Validations needed to be updated if property changes
4. Fix your tools to help you 
●Continuous Integration 
●Static code analyzers 
●Dynamic code analyzers 
●Penetration tests tools
4 Continuous Integration 
●Find compile errors in configuration 
●Automate robustness testing 
○Unit 
○Integration 
○System 
○Fuzz
4 Analyze the code 
●Evaluate state of code checked in 
○Complexity 
○Rule breaking 
●Tools 
○SonarQube 
○Coverity 
○Fortify
5. Add activities to sprints 
●Update high level diagram 
●Keep updated 
●Fuzz-testing
Buckets 
●Verification 
○Fuzz 
○Data-flow 
●Design 
○Cryptology 
○Privacy 
●Planning 
○Privacy tests 
○Internal symbols
Recipe that works! 
1.Architecture Overview 
2.Have threat modelling sessions 
3.Review all new requirements/stories 
4.Fix your tools to help you 
5.Add YOUR activities to sprint
Q & A 
-This won’t work in my team since… 
petter.sandholdt@softhouse.se
Agile Secure Development
Thank You

More Related Content

PDF
Bug Bounties and The Path to Secure Software by 451 Research
PDF
DevSecOps for Developers: How To Start
PDF
Zero to Ninety in Securing DevOps
PPTX
Mobile security recipes for xamarin
PDF
Adversary Driven Defense in the Real World
PPTX
Security Champions - Introduce them in your Organisation
PPTX
Threat Modeling with Threat Dragon
PPTX
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
Bug Bounties and The Path to Secure Software by 451 Research
DevSecOps for Developers: How To Start
Zero to Ninety in Securing DevOps
Mobile security recipes for xamarin
Adversary Driven Defense in the Real World
Security Champions - Introduce them in your Organisation
Threat Modeling with Threat Dragon
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...

What's hot (20)

PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
Top 10 Practices of Highly Successful DevOps Incident Management Teams
PDF
How to automate your DevSecOps successfully
PPTX
ExpoQA19 slides security awareness Steven Nienhuis
PDF
Security in open source projects
PDF
DevSecOps: A New Hope for Security in CI/CD
PPTX
Unit testing : what are you missing for security
PDF
Maturing DevSecOps: From Easy to High Impact
PDF
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
PPTX
DevSecOps Days SF at RSA Conference 2018
PDF
Demystifying DevSecOps
PDF
Dev week cloud world conf2021
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
[OWASP Poland Day] OWASP for testing mobile applications
PPTX
2020 05-tech saturday-devsecops-#2-v03
PDF
Pentest is yesterday, DevSecOps is tomorrow
PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
PDF
Why does security matter for devops by Caroline Wong
PPTX
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
PDF
DevSecOps Everything You Need To Know
Bridging the Security Testing Gap in Your CI/CD Pipeline
Top 10 Practices of Highly Successful DevOps Incident Management Teams
How to automate your DevSecOps successfully
ExpoQA19 slides security awareness Steven Nienhuis
Security in open source projects
DevSecOps: A New Hope for Security in CI/CD
Unit testing : what are you missing for security
Maturing DevSecOps: From Easy to High Impact
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
DevSecOps Days SF at RSA Conference 2018
Demystifying DevSecOps
Dev week cloud world conf2021
Elizabeth Lawler - Devops, security, and compliance working in unison
[OWASP Poland Day] OWASP for testing mobile applications
2020 05-tech saturday-devsecops-#2-v03
Pentest is yesterday, DevSecOps is tomorrow
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
Why does security matter for devops by Caroline Wong
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
DevSecOps Everything You Need To Know
Ad

Similar to Agile Secure Development (20)

PPTX
Agile and Secure SDLC
PDF
AppSec How-To: Achieving Security in DevOps
PDF
AppSec in an Agile World
PPT
Software security engineering
PPT
Software security engineering
PPT
Software Security Engineering
PDF
A journey into Application Security
PPTX
Application security testing in the age of Agile development - by Julio Cesar...
ODP
Matthew Coles - Izar Tarandach - Security Toolbox
PPT
Software Security in the Real World
PDF
SDLC & DevSecOps
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PDF
ProdSec: A Technical Approach
PPTX
Security within Scaled Agile
PPTX
Agile security
PPTX
Hacker vs Tools: Which to Choose?
PPTX
Hacker vs tools
PPTX
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
PDF
An Introduction to Secure Application Development
PDF
Security Checkpoints in Agile SDLC
Agile and Secure SDLC
AppSec How-To: Achieving Security in DevOps
AppSec in an Agile World
Software security engineering
Software security engineering
Software Security Engineering
A journey into Application Security
Application security testing in the age of Agile development - by Julio Cesar...
Matthew Coles - Izar Tarandach - Security Toolbox
Software Security in the Real World
SDLC & DevSecOps
Security Culture from Concept to Maintenance: Secure Software Development Lif...
ProdSec: A Technical Approach
Security within Scaled Agile
Agile security
Hacker vs Tools: Which to Choose?
Hacker vs tools
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
An Introduction to Secure Application Development
Security Checkpoints in Agile SDLC
Ad

More from Bosnia Agile (20)

PDF
Psychological Safety and Remote Work by Matthew Philip
PDF
Agile playground - Navigating Change Through Continuous experimentation by St...
PDF
Culture eats everything for breakfast! by Vladimir Kelava
PDF
Beyond Boundaries: Nurturing Psychological Safety for Tech Excellence by Barı...
PDF
Banking Reimagined - Navigating the Adaptive transformation by Ana Kafadar
PDF
Decoding Success in Pharma and e-Health by Lejla Zonić
PDF
Agile Experimentation in Everyday Life - A Guide to More Aha! moments by Milo...
PDF
Agile Experimentation in Everyday Life - A Guide to More Aha! moments by Milo...
PDF
How AI will transform agile project management by Jasna Pleho and Elvir Ćesko
PDF
How can Operational Value Streams Shape Your Product Strategy and Roadmap Suc...
PDF
Agile is not just for software development, it’s for the whole business! by O...
PDF
Supercharge your teams with Value Stream Management by Richard Knaster
PDF
Data Visualization Techniques in Meteorological and Climatological World usin...
PDF
Creating transformation in Healthcare by Banu Gülsün, Mutlu Çiçek and Onur Ön...
PDF
Production Support - the DevOps way by Mustafa Mehmedić
PDF
The Rationale for Continuous Delivery by Dave Farley
PDF
What’s a Design Sprint and Why Does it Matter? by Elvis Pivić
PDF
Disciplined Agile:  Past, present, and future. The path to true business agil...
PDF
Building a world-class work culture by Rešad Začina
PDF
Scrum Turns 25 - Usage and the future by Dave West
Psychological Safety and Remote Work by Matthew Philip
Agile playground - Navigating Change Through Continuous experimentation by St...
Culture eats everything for breakfast! by Vladimir Kelava
Beyond Boundaries: Nurturing Psychological Safety for Tech Excellence by Barı...
Banking Reimagined - Navigating the Adaptive transformation by Ana Kafadar
Decoding Success in Pharma and e-Health by Lejla Zonić
Agile Experimentation in Everyday Life - A Guide to More Aha! moments by Milo...
Agile Experimentation in Everyday Life - A Guide to More Aha! moments by Milo...
How AI will transform agile project management by Jasna Pleho and Elvir Ćesko
How can Operational Value Streams Shape Your Product Strategy and Roadmap Suc...
Agile is not just for software development, it’s for the whole business! by O...
Supercharge your teams with Value Stream Management by Richard Knaster
Data Visualization Techniques in Meteorological and Climatological World usin...
Creating transformation in Healthcare by Banu Gülsün, Mutlu Çiçek and Onur Ön...
Production Support - the DevOps way by Mustafa Mehmedić
The Rationale for Continuous Delivery by Dave Farley
What’s a Design Sprint and Why Does it Matter? by Elvis Pivić
Disciplined Agile:  Past, present, and future. The path to true business agil...
Building a world-class work culture by Rešad Začina
Scrum Turns 25 - Usage and the future by Dave West

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Spectroscopy.pptx food analysis technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
Unlocking AI with Model Context Protocol (MCP)
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars

Agile Secure Development

  • 1. SARAJEVO, 27.10.2014 Agile Secure Development Petter Sandholdt -How to make the agile team work with security requirements
  • 2. Who am I? Petter Sandholdt -Senior Developer -Senior Security Consultant -Java, C, C++, C#, Cocoa, Erlang, PHP, Pike, Ruby, Cobol, Fortran, Lisp -Security in R&D for last 6 years ... in agile teams the last 5 years
  • 3. Easy targets Verizon Enterprise’s 2013 Data Breach Investigations Report ●47,000reported security incidents, ●621confirmed data security breaches ●companies of all sizes. http://www.verizonenterprise.com/DBIR/2013/ 78% of successful security intrusions were simple to pull off
  • 4. What do Dev and SO think? http://www.pcadvisor.co.uk/news/network-wifi/3345773/developers-say-application-security-lacking/#ixzz2Vj0QCALy Developers Security Officers Security of applications is not addressed There is no build security in process SSDLC Application had a security breach during the past 2 years Did not receive software and application security training Application meets security regulations 70% 50% 80% 64% 68% 47% 50% 50% 15% 12%
  • 5. Agile application ≠ Secure? Agile moto: ●Do what’s in the sprint XP moto: ●Never do more that what’s required TDD moto: ●Code until its green
  • 6. Agile application = Secure? REQS CODE
  • 7. Agile application = Secure? CODE REQS NOT TESTED
  • 8. When is an application secure? ●Requires hard-to-guess passwords? ●Has input validation? ●Has up-to-date and hardened 3rd-party libraries? ●The one that fulfills the security requirementsof the application
  • 9. How can the POs know about security? POs are OWNERSin that role decide what is important for this application. ●Deployability (Architects or Operations) ●Performance (Architects,Testers & DBA) ●How to code it (Developers)
  • 10. Secure Software Development Life Cycles ●Microsoft SDL ●Adobe SPLC ●CLASP ●Cigital Touchpoints
  • 11. Secure Coding in 5 minutes 1.Take Responsibility 2.Never trust data 3.Create a threat model 4.Keep yourself updated 5.Make a fuzz 6.Stay proud of your code 7.Use the best tools http://bit.ly/1dZ6fwA
  • 12. Recipe that works! 1.Architecture Overview 2.Have threat modelling sessions 3.Review all new requirements/stories 4.Fix your tools to help you 5.Add YOUR activities to sprint
  • 14. 1. Architecture overview Image from: http://msdn.microsoft.com/en-us/library/ff649779.aspx
  • 16. Agile??? WTF! More artifacts! Not on my watch! -Helps collaboration-Find discrepancies-Creates ONE terminology
  • 17. 2. Threat Modeling session ●First session ○Brainstorming ●Following sessions ○Discussions aroundadded entities
  • 18. 2. Threat Modeling session Threat Property we want Spoofing Authentication Tampering Integrity Repudiation Non-repudiation Information Disclosure Confidenciality Denial of Service Authentification Elevation of Privilege Authorization
  • 19. Threat Modeling session Elevation of Privilege (EoP) Card Game
  • 20. 3. Backlog Review Look at the backlog from a security perspective Security Expert (from team) and PO Create checklist to facilitate
  • 21. 3. Checklist Example ●How will this new functionality be accessed? ●Can this affect “protected identites”? ●New entites in theatmodel require adding a new theatmodel session ●New role of users needs new validations on each resource ●Validations needed to be updated if property changes
  • 22. 4. Fix your tools to help you ●Continuous Integration ●Static code analyzers ●Dynamic code analyzers ●Penetration tests tools
  • 23. 4 Continuous Integration ●Find compile errors in configuration ●Automate robustness testing ○Unit ○Integration ○System ○Fuzz
  • 24. 4 Analyze the code ●Evaluate state of code checked in ○Complexity ○Rule breaking ●Tools ○SonarQube ○Coverity ○Fortify
  • 25. 5. Add activities to sprints ●Update high level diagram ●Keep updated ●Fuzz-testing
  • 26. Buckets ●Verification ○Fuzz ○Data-flow ●Design ○Cryptology ○Privacy ●Planning ○Privacy tests ○Internal symbols
  • 27. Recipe that works! 1.Architecture Overview 2.Have threat modelling sessions 3.Review all new requirements/stories 4.Fix your tools to help you 5.Add YOUR activities to sprint
  • 28. Q & A -This won’t work in my team since… petter.sandholdt@softhouse.se