SlideShare a Scribd company logo
Agile Software Security Olli Ahonen
Outline Security assurance Misaligned Aligned Evil user stories Microsoft
Outline Security assurance Misaligned Aligned Evil user stories Microsoft
Security assurance Design principles Static code analysis External reviews Penetration testing ...
“ Good old heavyweight assurance processes” K. Beznosov and P. Kruchten
Outline Security assurance Misaligned Aligned Evil user stories Microsoft
Root causes
Working software over  comprehensive   documentation
Big Up-Front Design
Deliver working software   frequently
Deliver working software   frequently Collective ownership of code
Deliver working software   frequently Collective ownership of code Back to square one + =
3rd party Independence Objectivity Credibility
Misaligned External reviews Analysis and validation Test depth analysis Manual security testing
Root causes
Outline Security assurance Misaligned Aligned Evil user stories Microsoft
Natural match Internal reviews Build security in
Works anyway Architecture and design principles High-level languages & run-time environments Change tracking
Automatic Static code analysis Unit testing System testing
Outline Security assurance Misaligned Aligned Evil user stories Microsoft
Evil user stories From user stories “ How can this functionality be misused?” Build security in As an employee, I can search for other employees by their last name As an employee, I can alter the database by inserting an SQL search string
Disconnected stories “ User adds  “&debug=true”  to URL on any page, and receives debug information that discloses system configuration details.”
Missing stories Incomplete Inexpressible
Outline Security assurance Misaligned Aligned Evil user stories Microsoft
Security Development Lifecycle Attack surface analysis Threat modeling Cryptography review Response plan ...
SDL/ Agile
SDL/ Agile
SDL/ Agile
SDL/ Agile
Summary Don’t force it Nourish synergy Aim for  secure enough

More Related Content

PPTX
Using Extended Events
PPTX
Sql injection
DOC
A review of the features/tutorialoutlet
PPTX
Visual Studio 2010 Ultimate
PPTX
Sql injections (Basic bypass authentication)
PPTX
SQL Server Security and Intrusion Prevention
PDF
TLC2018 Tanya Kravtsov: 10 Steps to CI, Testing and Delivery
PDF
Markus Paasovaara: Face recognition
Using Extended Events
Sql injection
A review of the features/tutorialoutlet
Visual Studio 2010 Ultimate
Sql injections (Basic bypass authentication)
SQL Server Security and Intrusion Prevention
TLC2018 Tanya Kravtsov: 10 Steps to CI, Testing and Delivery
Markus Paasovaara: Face recognition

Similar to Agile Software Security (20)

PPT
Agnitio: its static analysis, but not as we know it
PPTX
Application Security at DevOps Speed and Portfolio Scale
PDF
Agile Software Architecture
PPT
4.Security Assessment And Testing
PDF
Devops security-An Insight into Secure-SDLC
PDF
Software Analytics: Data Analytics for Software Engineering and Security
PPTX
Security Best Practices
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PPT
Software Security Testing
PDF
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
PPTX
Overcoming Security Challenges in DevOps
PPT
AMI Security 101 - Smart Grid Security East 2011
PDF
What Every Developer And Tester Should Know About Software Security
PPT
香港六合彩
PDF
Shaloo Verma
PPT
Secure SDLC for Software
PDF
[OPD 2019] Threat modeling at scale
PPTX
Build a complete security operations and compliance program using a graph dat...
PPTX
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
PDF
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Agnitio: its static analysis, but not as we know it
Application Security at DevOps Speed and Portfolio Scale
Agile Software Architecture
4.Security Assessment And Testing
Devops security-An Insight into Secure-SDLC
Software Analytics: Data Analytics for Software Engineering and Security
Security Best Practices
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Software Security Testing
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
Overcoming Security Challenges in DevOps
AMI Security 101 - Smart Grid Security East 2011
What Every Developer And Tester Should Know About Software Security
香港六合彩
Shaloo Verma
Secure SDLC for Software
[OPD 2019] Threat modeling at scale
Build a complete security operations and compliance program using a graph dat...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Leverage DevOps & Agile Development to Transform Your Application Testing Pro...
Ad

More from Futurice (10)

PDF
Future of Mobility - Futurice Stockholm
PDF
Future of Mobility - Futurice Stockholm
PDF
Fantastic Problems and Where to Find Them: Daryl Weir
PDF
Pepperoni – A framework for spicing up your mobile apps with React Native
PDF
Pepperoni 2.0 - How to spice up your mobile apps
PDF
Reark : a Reference Architecture for Android using RxJava
PDF
Futurice Retail Trends 2020
PPTX
Winning hearts with data driven services
PDF
Testing Without Waste - Automatic Testing
PPTX
Project thinking and digital service business
Future of Mobility - Futurice Stockholm
Future of Mobility - Futurice Stockholm
Fantastic Problems and Where to Find Them: Daryl Weir
Pepperoni – A framework for spicing up your mobile apps with React Native
Pepperoni 2.0 - How to spice up your mobile apps
Reark : a Reference Architecture for Android using RxJava
Futurice Retail Trends 2020
Winning hearts with data driven services
Testing Without Waste - Automatic Testing
Project thinking and digital service business
Ad

Recently uploaded (20)

PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
5 Stages of group development guide.pptx
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
IFRS Notes in your pocket for study all the time
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPT
Chapter four Project-Preparation material
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Belch_12e_PPT_Ch18_Accessible_university.pptx
5 Stages of group development guide.pptx
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
unit 1 COST ACCOUNTING AND COST SHEET
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Chapter 5_Foreign Exchange Market in .pdf
IFRS Notes in your pocket for study all the time
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Power and position in leadershipDOC-20250808-WA0011..pdf
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Laughter Yoga Basic Learning Workshop Manual
2025 Product Deck V1.0.pptxCATALOGTCLCIA
New Microsoft PowerPoint Presentation - Copy.pptx
Chapter four Project-Preparation material
HR Introduction Slide (1).pptx on hr intro
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise

Agile Software Security