SlideShare a Scribd company logo
Application Security
In an Agile World
Stefan Streichsbier
CTO at Vantage Point
Twitter: @s_streichsbier
A brief
history of
AppSec
✤ Let’s start with what it is not:
• Firewalls, secure network protocols,
• Antivirus and Phishing attacks
• Intrusion Detection
• SoCs, ...
What is AppSec?
Firewall is locked down tight,
...only 443 is open…
✤ Application Security is:
• A quality aspect of your application
• And contributes to the business success the same way UX Design,
Usability and Performance do.
• In other words, is my application used the way it is intended to.
What is AppSec?
✤ Security was traditionally in the hands of Network folks
• Suddenly, they become responsible for applications...
• ... And applied the same audit-like principals.
Why AppSec == Pain?
Application Security in an Agile World - Agile Singapore 2016
✤ Things slowly evolved
• From performing “Penetration Tests” once a year
• To doing a Pentest for every release (a few times a year)
Pentest to the rescue
Great, we all love Pentests, right?
Pentesters after
turning a report
in...
Security
Meanwhile
outside the
security camp
...
0
20
40
60
80
100
120
140
2005 2010 2015 2020
The frequency of releases over time
Releases per app per year
Towards CD
From Waterfall
The frequency increased
14
So many releases?!
Security
DevOps
16
Agile + DevOps + Security = DevSecOps
Step 1:
Security as
part of Agile
1-4
Weeks
24 hours
Develop
Test
Design
Plan
Output
Shippable Increment
Product Backlog Sprint Backlog
Let’s look at SCRUM
Start with understanding the process
✤ No more pdf/doc/xls!
✤ Security uses the same language as the dev team.
✤ Security as part of existing environments/workflows.
✤ Security work is completed in-cycle.
✤ Not all apps have the same security requirements.
Some general hygiene
0x
5x
10x
15x
20x
25x
30x
35x
Requirements/Design Coding Integration Testing Acceptance Testing Production
Relative Cost to fix, based on time of detection
Penetration Testing
Source: NIST
Relative Cost
1-4
Weeks
24 hours
Develop
Test
Design
Plan
Output
Shippable Increment
Product Backlog Sprint Backlog
Secure SCRUM
Security Training
Security Requirements
Security Activities
Threat Modelling
Design Review
Pairing
Manual Security Tests
Automatic Security Tests
Security Feature Demo Security Retrospective
Security Acceptance Criteria
(Security) Training
Are all security requirements
non-functional?
✤ Functional security requirement are related to:
- Authentication & Access Control
- Data Integrity
- Wrong password lockouts
✤ Non-functional requirements are related to:
- Password policies
- Characteristics of audit logs
- Backups
Functional vs Non-Functional
• It all starts with the backlog & security is a part of this:
• 1. As an anonymous user I want to see the entire book selection, ...
• 2. As a logged-in user I want to see my entire purchase history, ...
• 3. As a customer I want to ensure my privacy when using a public wifi , ...
(Security) Requirements
- User Story and it’s acceptance criteria is unrelated to security
- User Story and it’s acceptance criteria is security sensitive [tagged]
- “One-off” (Security) User story [tagged]
v Architecture & Design Review & Threat Modelling
Think like a hacker
v Design Guidelines are invaluable.
Use existing design patterns
v Helps to reducing the ongoing amount of work
Secure by Design
✤ Assorted Secure Coding Guidelines in the repo
✤ Pairing for more complex stories
✤ Pull requests for security relevant stories are reviewed
- Code reviews are important (especially for increased speed).
Secure Coding
99% of unit
tests passed
✤ Code coverage is key aspect of quality
100% is just the beginning
✤ Security related acceptance criteria makes a difference
Both for manual and automated tests
✤ The more that is automated the better
Security Unit Tests
✤ Open source projects can help
- Gauntlt
- BDD-Security
Security Unit Tests
✤ Continue demonstrating the new attributes/features and their
impact on users
✤ What were the security considerations for this new feature
✤ In the retrospective share those lessons learned
Sprint Review & Retro
Is security hard?
0
20
40
60
80
100
120
Jan March May July September November
% Remaining Security work % App Robustness, Security Skills
Security Debt Burndown
Step 2:
DevSecOps
Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016
Vulnerability
Repository
• Security Unit
Tests
• SAST
• SCA
• DAST
• IAST
• VA
• Security as Code
• RASP
• NG WAF
• Red Team
• GOPT
• Actual Attackers
• Sec Requirements
• Design Review
• Threat Modelling
AppSec Pipeline
Instead of this ...
...Let’s do this...
Announcements
DevSecCon Asia 2017
✤ Start with embedding your friendly AppSec guy
✤ Transfer knowledge, find a security champion
✤ Step back and advise
✤ Iterate continuously– don’t go for big bang
✤ Keep adding automation
✤ Churn out awesome (& secure) releases at the speed of DevOps
From Zero to Hero
stefan@vantagepoint.sg
@s_streichsbier
Stefan Streichsbier
https://devsecopssg.herokuapp.com
Questions?
References
• https://www.infoq.com/presentations/Facebook-Moving-Fast-at-Scale
• Jeff Williams: 2013 Appsec USA: https://www.youtube.com/watch?v=cIvOth0fxmI&t=377
• http://blog.diniscruz.com
• https://www.owasp.org/index.php/OWASP_AppSec_Pipeline
• http://www.slideshare.net/SeniorStoryteller/amy-demartine-7-habits-of-rugged-devops

More Related Content

PPTX
Null application security in an agile world
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
DevSecCon London 2017: How far left do you want to go with security? by Javie...
PDF
DevSecCon London 2017: Shift happens ... by Colin Domoney
PDF
Devops: Security's big opportunity by Peter Chestna
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
Practical DevSecOps Course - Part 1
PPTX
The Journey to DevSecOps
Null application security in an agile world
Application Security at DevOps Speed - DevOpsDays Singapore 2016
DevSecCon London 2017: How far left do you want to go with security? by Javie...
DevSecCon London 2017: Shift happens ... by Colin Domoney
Devops: Security's big opportunity by Peter Chestna
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Practical DevSecOps Course - Part 1
The Journey to DevSecOps

What's hot (20)

PDF
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PDF
DevSecOps - The big picture
PDF
Ast in CI/CD by Ofer Maor
PDF
DevSecOps and the CI/CD Pipeline
PDF
DevSecOps: essential tooling to enable continuous security 2019-09-16
PPTX
DEVSECOPS: Coding DevSecOps journey
PDF
DevSecOps - The big picture
PDF
Dos and Don'ts of DevSecOps
PDF
Integrating DevOps and Security
PPTX
DevSecOps-OWASP Indonesia Day 2017
PDF
A Secure DevOps Journey
PPTX
Implementing an Application Security Pipeline in Jenkins
PDF
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
PDF
The Future of DevSecOps
PPTX
DevSecOps : an Introduction
PDF
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
PDF
Renato Rodrigues - Security in the wild
PDF
DevSecOps Fundamentals and the Scars to Prove it.
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecOps - The big picture
Ast in CI/CD by Ofer Maor
DevSecOps and the CI/CD Pipeline
DevSecOps: essential tooling to enable continuous security 2019-09-16
DEVSECOPS: Coding DevSecOps journey
DevSecOps - The big picture
Dos and Don'ts of DevSecOps
Integrating DevOps and Security
DevSecOps-OWASP Indonesia Day 2017
A Secure DevOps Journey
Implementing an Application Security Pipeline in Jenkins
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
The Future of DevSecOps
DevSecOps : an Introduction
DevSecOps Singapore 2017 - Security in the Delivery Pipeline
Renato Rodrigues - Security in the wild
DevSecOps Fundamentals and the Scars to Prove it.
Ad

Viewers also liked (20)

PDF
SecDevOps Risk Workflow - v0.6
PPTX
DevOps & Security: Here & Now
PDF
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
PDF
How to adapt the SDLC to the era of DevSecOps
PDF
OutSystems Webinar - Building a Live Style Guide
PPTX
Software
PPTX
Making Security Agile
PDF
Informe scsi 2012 sobre ciberseguridad
PPTX
Viii congreso isaca 2015 grc
PDF
Implementing NIST Cybersecurity Framework Using COBIT 5
PDF
Cyberseguridad en entornos empresariales
PDF
Industrial cyber security_tgs_barcelona_jun_2015_v1.pptx
PDF
ICION 2016 - Cyber Security Governance
PDF
Ciber... nacion: afrontando los retos del siglo XXI
PDF
¡¡Ya hemos llegado!! @socialbrainsES, @BETA_permanente y @dygytalyaCOM han na...
PDF
End-user computing - The Mobile Workforce Report
ODP
Building an Open Source AppSec Pipeline
PDF
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PPTX
Digital transformation: introduction to cyber risk
SecDevOps Risk Workflow - v0.6
DevOps & Security: Here & Now
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
How to adapt the SDLC to the era of DevSecOps
OutSystems Webinar - Building a Live Style Guide
Software
Making Security Agile
Informe scsi 2012 sobre ciberseguridad
Viii congreso isaca 2015 grc
Implementing NIST Cybersecurity Framework Using COBIT 5
Cyberseguridad en entornos empresariales
Industrial cyber security_tgs_barcelona_jun_2015_v1.pptx
ICION 2016 - Cyber Security Governance
Ciber... nacion: afrontando los retos del siglo XXI
¡¡Ya hemos llegado!! @socialbrainsES, @BETA_permanente y @dygytalyaCOM han na...
End-user computing - The Mobile Workforce Report
Building an Open Source AppSec Pipeline
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Digital transformation: introduction to cyber risk
Ad

Similar to Application Security in an Agile World - Agile Singapore 2016 (20)

PPTX
Digital Product Security
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
BSides Vienna 2015
PDF
What Every Developer And Tester Should Know About Software Security
PDF
AppSec in an Agile World
PDF
Beyond security testing
PDF
Threat modelling & apps testing
PPTX
Security Services and Approach by Nazar Tymoshyk
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
Agile and Secure Development
PPTX
Secure SDLC in mobile software development.
PDF
Scaling security in a cloud environment v0.5 (Sep 2017)
PPTX
Agile and Secure SDLC
PDF
Owasp tds
PPT
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PDF
IPNEC - Security Services
PDF
Security Checkpoints in Agile SDLC
Digital Product Security
Bringing Security Testing to Development: How to Enable Developers to Act as ...
BSides Vienna 2015
What Every Developer And Tester Should Know About Software Security
AppSec in an Agile World
Beyond security testing
Threat modelling & apps testing
Security Services and Approach by Nazar Tymoshyk
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Agile and Secure Development
Secure SDLC in mobile software development.
Scaling security in a cloud environment v0.5 (Sep 2017)
Agile and Secure SDLC
Owasp tds
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
SCS DevSecOps Seminar - State of DevSecOps
IPNEC - Security Services
Security Checkpoints in Agile SDLC

More from Stefan Streichsbier (10)

PDF
DevSecOps in 2031: How robots and humans will secure apps together Log
PPTX
State of DevSecOps - DevSecOpsDays 2019
PPTX
State of DevSecOps - GTACS 2019
PPTX
Practical Secure Coding Workshop - {DECIPHER} Hackathon
PPTX
State of DevSecOps - DevOpsDays Jakarta 2019
PPTX
Security and Mobility Co Create Week Jakarta
PPTX
Securing a great Developer Experience - v1.3
PPTX
Securing a great DX - DevSecOps Days Singapore 2018
PDF
A Tale of Three Horses - RSAC 2017 APJ - DevOps Connect: DevSecOps Edition, S...
PPT
DevSecOps Singapore introduction
DevSecOps in 2031: How robots and humans will secure apps together Log
State of DevSecOps - DevSecOpsDays 2019
State of DevSecOps - GTACS 2019
Practical Secure Coding Workshop - {DECIPHER} Hackathon
State of DevSecOps - DevOpsDays Jakarta 2019
Security and Mobility Co Create Week Jakarta
Securing a great Developer Experience - v1.3
Securing a great DX - DevSecOps Days Singapore 2018
A Tale of Three Horses - RSAC 2017 APJ - DevOps Connect: DevSecOps Edition, S...
DevSecOps Singapore introduction

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Application Security in an Agile World - Agile Singapore 2016