SlideShare a Scribd company logo
Best practices for driving software quality through a
federated application security responsibility model
2
The growing chasm between security and development
Application Security Tools
Back Office
Systems (2000)
Software Development Velocity
Risk Chasm
• No visibility into software vulnerabilities or risk
• Unable to prioritize remediation
• Remediation slows software delivery
• Conflict between development and security
TheDigitalTransformation
• Financial Services
• Healthcare
• Manufacturing
• Retail
• Transportation
• Education
• Power & Energy
• Media & Hospitality
Software-Defined World (2020s)
3
Risk Management
Security
Compliance
Traditional, Centralized IT De-centralized IT
Federated
Responsibility
Model
DevOps guides a new model for AppSec
4
• Maintain corporate standards for
security
• Define security policies centrally,
enact locally
• Enforce security policies based on
application and business risk
• Deliver board-level metrics and
reporting for security, risk,
compliance
Maintain Enterprise Control
The foundations of the federated responsibility model for
AppSec
• Integrate AppSec scanning automation
and orchestration into DevOps pipelines
• Continuously scan for vulnerabilities
without slowing delivery
• Streamlining vulnerability findings into
meaningful and manageable outputs
• Reduce release friction by accelerating
vulnerability discovery and prioritizing
remediation
Accelerate Pipeline Velocity
• Meet security standards without
impacting DevOps workflows
• Prioritize vulnerabilities for remediation
by risk and business impact
• Enable developers to enact security,
without interacting with security tools
Empower Developers
5
The value of the federated AppSec responsibility model
Provides Board/LOB/enterprise and governance reporting on software risk,
compliance, pipeline and development productivity
Balances centralized security policy with the velocity and agility of DevOps
Facilities a partnership between product, engineering and operational teams
Motivates development teams to prioritize security even with the demands of
pipeline velocity
Provides oversight for the deployment of AppSec strategies across disparate
DevOps teams and toolchains
6
Common Challenges
Uniform Buy-in from all stakeholders
• Rowing in the same direction
Consistently Inconsistent
• Application Security and Heterogeneity, name a more iconic duo
Issue Routing
• Who should be told about what, when, and how
What to Fix & When
• Not everyone will agree on what should be prioritized
7
8
Uniform Buy-in from all Stakeholders
• Who are we talking about?
• Application Security Team/Product Security Team (probably not a problem)
• Application Development Team
• DevOps Team/IT Operations Team
• Business Leadership &/or Corporate Governance
Why would anyone not want to embrace a Federated Responsibility model?
• "That's not how we do things"
• Security is outside of their comfort zone
• Unclear how AppSec ties into their role
9
How to get Uniform Buy-In
• Olive Branches - Give the stakeholders something they can't get anywhere else
• Providing useful reports that they couldn't produce themselves
• Providing a strategic view
• Simplifying something those stakeholders must perform periodically (like scans for compliance)
Acknowledging the sins of the past
• If there's been friction and adversity in the past, ignoring that history won't resolve
itself. Acknowledge the prior pains caused by the AppSec program of yesteryear
• AppSec is now a resource to support development, not a barrier to delivery
Proof in Doing
• Find an Application team that is friendly towards the AppSec Program and focus on enabling
that team
• Once you can point to that success, it's easy to get additional buy in
10
11
Consistently Inconsistent
• Application Portfolios are diverse
• Code Languages
• Web Application Frameworks
• Application Architectures
• Build Processes
• Security Assessment Tool Portfolios are diverse
• Scan types (SAST/SCA/Container/DAST/Network/Cloud Environment/etc.)
• Language & Framework Affinities
• Scan Execution Models (Host Based/Agent Based/Passive/Active)
• Data Outputs (Risk Scoring/Verbosity/Remediation Instructions/Issue Granularity)
• Which scanners and how to implement them may wildly vary across you App
Portfolio. That's a lot of snowflakes and nobody has time for that.
12
How to Solve for Seemingly Infinite Inconsistency
• Identify the meaningful attributes about your applications that demand differentiation
• What are the coding languages present in your Application Portfolio? Does your SAST tool support them
all? What about new languages like Golang that pop up?
• What are the CICD platforms the Application/DevOps teams use? Centralized or discrete for each App?
• How do your Web Apps handle user authentication? You'll need to authenticate past the login page to
perform DAST assessments. Do all the Apps use the same auth layer? How does QA get past the login
page to perform regression tests?
Build a playbook to make the App onboarding process simpler
• Based on these differentiating attributes, you can put together standard "Plays" – e.g. All Java apps built on
the centralized Jenkins instance w/ no external facing Web App surface area will be scanned by X & Y at
build time, and Z during QA.
Normalize and abstract the scans so Dev & DevOps don't have to see how the AppSec
sausage is made
13
14
Routing the issues to the right people
• When people receive communications that aren't pertinent to them, they will
cognitively suppress those messages in the future
• If the person responsible for remediating an issue isn't aware there is an issue,
risk will never be reduced. It's not always obvious who is responsible for fixing
any given issue
• It's incumbent upon AppSec to intelligently route issues to the right people or
teams in a way that engenders engagement
• The structure and content of the message is as important as the accuracy of
delivery – you can't email a CSV file with 30k issues and expect someone else
to sort it out
• This is extremely hard and is a problem that scales geometrically as
organizations grow
15
How to Overcome the Issue Notification Barrier
• Use existing resources (organizational connectors, reference data sets like CMDB/App
Portfolio/IPM/Active Directory Groupings/etc.)
• No tribal knowledge – document what gets sent to whom
• You'll likely already know a lot of this intuitively – doesn't scale, nor does it hold up when something
falls through the cracks. As you uncover new routing pathways that need to be supported, document
those communication lines in one place
• Determine what an issue notification will look like before you send the first
communication
• What is the minimum amount of information the remediator will need to resolve the issue? How will
that effort be tracked in the remediator's tasking/ticket system? What happens if it should go to
someone else?
• Make the deliverable consistent with the other task/tickets that the remediators interact
with
• Security issues shouldn't be some alien format or wall of text - ask to see samples of functional bug
tickets and model after that syntax
16
17
What to fix and when?
Low/High High/High
High/LowLow/Low
Effort to Remediate
RiskReduced
• Getting to agreement on risk and effort to fix
• Remediation prioritization matrix
• Everyone agrees on two out of the four boxes – focus on
the low effort, high risk issues first, deprioritize the high
effort, low risk issues
• What to fix after low/high? Development teams tend to
focus on low/low next. AppSec teams tend to focus on
high/high next
• How does a business prioritize what to fix after the
obvious stuff?
18
How to Agree on What to Fix Next?
• Most applications have enough low effort/high risk remediations to tackle that
this challenge may not emerge for a year or more
• Backlog vs net-new issues: ongoing scanning throughout the SDLC reduces
the likelihood of newly introduced issues that are high risk or high effort to remediate,
so typically this problem is isolated to the backlog of security issues
• Both teams are right some of the time – bricks & mortar
• Low effort/low risk issues should be tackled in an ongoing fashion
• High effort/high risk issues need to be addressed in concert with the Development
team's initiatives. As the development team rearchitects parts of their app, AppSec can
piggyback to remediate issues related to the components that are being rebuilt
• Compensating controls/individual point remediations to reduce risk in the near-term,
but only if there is an acknowledgement that
19
ZeroNorth AppSec Automation & Orchestration Platform
20
A Federated Responsibility Model for AppSec
Uniting security, DevOps & the business
Maintain Enterprise Standards
Enable corporate security to enact centralized tools &
standards – and gain visibility for risk & compliance
Unburden & Empower Developers
Arm developers with tools to deliver secure software
without disrupting DevOps processes
Accelerate Pipeline Velocity
Pinpoint critical risks earlier to avoid late-stage
discoveries that jeopardize software releases
21
Learn more or request a personal demo at
zeronorth.io
Check out the new Federated Responsibility
for AppSec White Paper: go.zeronorth.io/frm

More Related Content

PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
Integrating SAP into DevOps Pipelines: Why and How
PDF
Driving Service Ownership with Distributed Tracing
PDF
More Than Monitoring: How Observability Takes You From Firefighting to Fire P...
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Wavefront presentation-May-2019
PPTX
DevOps 101 - Moving Fast with Confidence
PPTX
Wavefront by vmware june 2019 - legraswindow
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
Integrating SAP into DevOps Pipelines: Why and How
Driving Service Ownership with Distributed Tracing
More Than Monitoring: How Observability Takes You From Firefighting to Fire P...
Service Mesh: Two Big Words But Do You Need It?
Wavefront presentation-May-2019
DevOps 101 - Moving Fast with Confidence
Wavefront by vmware june 2019 - legraswindow

What's hot (20)

PPTX
Are you REALLY ready for the cloud?
PPTX
SplunkLive! Customer Presentation--ServiceNow
PDF
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
PPTX
How to monitor all aspects of Citrix NetScaler usage and performance within t...
PDF
Thinking about the full stack to create great mobile experiences
PDF
Cloud-Native Workshop New York- Dynatrace
PPTX
eG Express Cloud for Citrix Workspaces
PPTX
Mainframe MRI from CA Technologies
PPTX
DevOps Hits Adolescence – what’s next?
PDF
IIA4: Open Source and the Enterprise ( Predix Transform 2016)
PDF
Cloud Foundry Summit 2015: Making the Leap
PDF
Securing DevOps Lifecycle
PDF
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
PPT
How Citrix Admins can get a Virtual Assistant
PPTX
Do DevOps Right with New Relic
PDF
Monitoring a cloud native platform feature
PPTX
SplunkLive! London 2016 Splunk for Devops
PDF
Soluciones Dynatrace
PDF
Don't Let Technology Slow Down Your Digital Transformation
PDF
XebiaLabs Overview Slides
Are you REALLY ready for the cloud?
SplunkLive! Customer Presentation--ServiceNow
Microservices at Scale: How to Reduce Overhead and Increase Developer Product...
How to monitor all aspects of Citrix NetScaler usage and performance within t...
Thinking about the full stack to create great mobile experiences
Cloud-Native Workshop New York- Dynatrace
eG Express Cloud for Citrix Workspaces
Mainframe MRI from CA Technologies
DevOps Hits Adolescence – what’s next?
IIA4: Open Source and the Enterprise ( Predix Transform 2016)
Cloud Foundry Summit 2015: Making the Leap
Securing DevOps Lifecycle
AppSphere 15 - Mining the World’s Largest Healthcare Data Warehouse while Ens...
How Citrix Admins can get a Virtual Assistant
Do DevOps Right with New Relic
Monitoring a cloud native platform feature
SplunkLive! London 2016 Splunk for Devops
Soluciones Dynatrace
Don't Let Technology Slow Down Your Digital Transformation
XebiaLabs Overview Slides
Ad

Similar to Best Practices for Driving Software Quality through a Federated Application Security Responsibility Model (20)

PDF
AppSec in an Agile World
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
How to build app sec team & culture in your organization the hack summi...
PDF
Scaling AppSec through Education
PDF
App sec and quality london - may 2016 - v0.5
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PPTX
Application Security from the Inside Out
PPT
Software Security in the Real World
PDF
Legacy-SecDevOps (AppSec Management Debrief)
PDF
Applicaiton Security - Building The Audit Program
PDF
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
PPT
六合彩香港-六合彩
PDF
SC conference - Building AppSec Teams
PPTX
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
PDF
Tenants for Going at DevSecOps Speed - LASCON 2023
PPTX
Owasp summit slides day 2
PDF
SecDevOps Risk Workflow - v0.6
PPTX
HouSecCon 2019: Offensive Security - Starting from Scratch
AppSec in an Agile World
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
How to build app sec team & culture in your organization the hack summi...
Scaling AppSec through Education
App sec and quality london - may 2016 - v0.5
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Application Security from the Inside Out
Software Security in the Real World
Legacy-SecDevOps (AppSec Management Debrief)
Applicaiton Security - Building The Audit Program
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
六合彩香港-六合彩
SC conference - Building AppSec Teams
Devops - Accelerating the Pace and Securing Along the Way - Thaddeus Walsh
Tenants for Going at DevSecOps Speed - LASCON 2023
Owasp summit slides day 2
SecDevOps Risk Workflow - v0.6
HouSecCon 2019: Offensive Security - Starting from Scratch
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
cuic standard and advanced reporting.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25-Week II
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine Learning_overview_presentation.pptx
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
Assigned Numbers - 2025 - Bluetooth® Document
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Best Practices for Driving Software Quality through a Federated Application Security Responsibility Model

  • 1. Best practices for driving software quality through a federated application security responsibility model
  • 2. 2 The growing chasm between security and development Application Security Tools Back Office Systems (2000) Software Development Velocity Risk Chasm • No visibility into software vulnerabilities or risk • Unable to prioritize remediation • Remediation slows software delivery • Conflict between development and security TheDigitalTransformation • Financial Services • Healthcare • Manufacturing • Retail • Transportation • Education • Power & Energy • Media & Hospitality Software-Defined World (2020s)
  • 3. 3 Risk Management Security Compliance Traditional, Centralized IT De-centralized IT Federated Responsibility Model DevOps guides a new model for AppSec
  • 4. 4 • Maintain corporate standards for security • Define security policies centrally, enact locally • Enforce security policies based on application and business risk • Deliver board-level metrics and reporting for security, risk, compliance Maintain Enterprise Control The foundations of the federated responsibility model for AppSec • Integrate AppSec scanning automation and orchestration into DevOps pipelines • Continuously scan for vulnerabilities without slowing delivery • Streamlining vulnerability findings into meaningful and manageable outputs • Reduce release friction by accelerating vulnerability discovery and prioritizing remediation Accelerate Pipeline Velocity • Meet security standards without impacting DevOps workflows • Prioritize vulnerabilities for remediation by risk and business impact • Enable developers to enact security, without interacting with security tools Empower Developers
  • 5. 5 The value of the federated AppSec responsibility model Provides Board/LOB/enterprise and governance reporting on software risk, compliance, pipeline and development productivity Balances centralized security policy with the velocity and agility of DevOps Facilities a partnership between product, engineering and operational teams Motivates development teams to prioritize security even with the demands of pipeline velocity Provides oversight for the deployment of AppSec strategies across disparate DevOps teams and toolchains
  • 6. 6 Common Challenges Uniform Buy-in from all stakeholders • Rowing in the same direction Consistently Inconsistent • Application Security and Heterogeneity, name a more iconic duo Issue Routing • Who should be told about what, when, and how What to Fix & When • Not everyone will agree on what should be prioritized
  • 7. 7
  • 8. 8 Uniform Buy-in from all Stakeholders • Who are we talking about? • Application Security Team/Product Security Team (probably not a problem) • Application Development Team • DevOps Team/IT Operations Team • Business Leadership &/or Corporate Governance Why would anyone not want to embrace a Federated Responsibility model? • "That's not how we do things" • Security is outside of their comfort zone • Unclear how AppSec ties into their role
  • 9. 9 How to get Uniform Buy-In • Olive Branches - Give the stakeholders something they can't get anywhere else • Providing useful reports that they couldn't produce themselves • Providing a strategic view • Simplifying something those stakeholders must perform periodically (like scans for compliance) Acknowledging the sins of the past • If there's been friction and adversity in the past, ignoring that history won't resolve itself. Acknowledge the prior pains caused by the AppSec program of yesteryear • AppSec is now a resource to support development, not a barrier to delivery Proof in Doing • Find an Application team that is friendly towards the AppSec Program and focus on enabling that team • Once you can point to that success, it's easy to get additional buy in
  • 10. 10
  • 11. 11 Consistently Inconsistent • Application Portfolios are diverse • Code Languages • Web Application Frameworks • Application Architectures • Build Processes • Security Assessment Tool Portfolios are diverse • Scan types (SAST/SCA/Container/DAST/Network/Cloud Environment/etc.) • Language & Framework Affinities • Scan Execution Models (Host Based/Agent Based/Passive/Active) • Data Outputs (Risk Scoring/Verbosity/Remediation Instructions/Issue Granularity) • Which scanners and how to implement them may wildly vary across you App Portfolio. That's a lot of snowflakes and nobody has time for that.
  • 12. 12 How to Solve for Seemingly Infinite Inconsistency • Identify the meaningful attributes about your applications that demand differentiation • What are the coding languages present in your Application Portfolio? Does your SAST tool support them all? What about new languages like Golang that pop up? • What are the CICD platforms the Application/DevOps teams use? Centralized or discrete for each App? • How do your Web Apps handle user authentication? You'll need to authenticate past the login page to perform DAST assessments. Do all the Apps use the same auth layer? How does QA get past the login page to perform regression tests? Build a playbook to make the App onboarding process simpler • Based on these differentiating attributes, you can put together standard "Plays" – e.g. All Java apps built on the centralized Jenkins instance w/ no external facing Web App surface area will be scanned by X & Y at build time, and Z during QA. Normalize and abstract the scans so Dev & DevOps don't have to see how the AppSec sausage is made
  • 13. 13
  • 14. 14 Routing the issues to the right people • When people receive communications that aren't pertinent to them, they will cognitively suppress those messages in the future • If the person responsible for remediating an issue isn't aware there is an issue, risk will never be reduced. It's not always obvious who is responsible for fixing any given issue • It's incumbent upon AppSec to intelligently route issues to the right people or teams in a way that engenders engagement • The structure and content of the message is as important as the accuracy of delivery – you can't email a CSV file with 30k issues and expect someone else to sort it out • This is extremely hard and is a problem that scales geometrically as organizations grow
  • 15. 15 How to Overcome the Issue Notification Barrier • Use existing resources (organizational connectors, reference data sets like CMDB/App Portfolio/IPM/Active Directory Groupings/etc.) • No tribal knowledge – document what gets sent to whom • You'll likely already know a lot of this intuitively – doesn't scale, nor does it hold up when something falls through the cracks. As you uncover new routing pathways that need to be supported, document those communication lines in one place • Determine what an issue notification will look like before you send the first communication • What is the minimum amount of information the remediator will need to resolve the issue? How will that effort be tracked in the remediator's tasking/ticket system? What happens if it should go to someone else? • Make the deliverable consistent with the other task/tickets that the remediators interact with • Security issues shouldn't be some alien format or wall of text - ask to see samples of functional bug tickets and model after that syntax
  • 16. 16
  • 17. 17 What to fix and when? Low/High High/High High/LowLow/Low Effort to Remediate RiskReduced • Getting to agreement on risk and effort to fix • Remediation prioritization matrix • Everyone agrees on two out of the four boxes – focus on the low effort, high risk issues first, deprioritize the high effort, low risk issues • What to fix after low/high? Development teams tend to focus on low/low next. AppSec teams tend to focus on high/high next • How does a business prioritize what to fix after the obvious stuff?
  • 18. 18 How to Agree on What to Fix Next? • Most applications have enough low effort/high risk remediations to tackle that this challenge may not emerge for a year or more • Backlog vs net-new issues: ongoing scanning throughout the SDLC reduces the likelihood of newly introduced issues that are high risk or high effort to remediate, so typically this problem is isolated to the backlog of security issues • Both teams are right some of the time – bricks & mortar • Low effort/low risk issues should be tackled in an ongoing fashion • High effort/high risk issues need to be addressed in concert with the Development team's initiatives. As the development team rearchitects parts of their app, AppSec can piggyback to remediate issues related to the components that are being rebuilt • Compensating controls/individual point remediations to reduce risk in the near-term, but only if there is an acknowledgement that
  • 19. 19 ZeroNorth AppSec Automation & Orchestration Platform
  • 20. 20 A Federated Responsibility Model for AppSec Uniting security, DevOps & the business Maintain Enterprise Standards Enable corporate security to enact centralized tools & standards – and gain visibility for risk & compliance Unburden & Empower Developers Arm developers with tools to deliver secure software without disrupting DevOps processes Accelerate Pipeline Velocity Pinpoint critical risks earlier to avoid late-stage discoveries that jeopardize software releases
  • 21. 21 Learn more or request a personal demo at zeronorth.io Check out the new Federated Responsibility for AppSec White Paper: go.zeronorth.io/frm