SlideShare a Scribd company logo
3
Most read
6
Most read
8
Most read
Building Security In – A
Tale of Two Stories!
Laksh	Raghavan
PayPal	Inc.
@laraghavan
Introduction
2
• This	presentation	is:
– A	case	study	on	how	PayPal’s	Secure	Product	Lifecycle	(SLPC)	had	to	adapt	to	Agile	with	
a	focus	on	security	stories
– Vendor	neutral
– Descriptive
– For	large	enterprises	grappling	with	scale/process	issues
• This	presentation	is	NOT:
– Silver	Bullet	TM
– Sales	pitch
– Prescriptive	- if	you	implement	the	same,	YMMV	J
PayPal’s	Agile	Transformation
3
• Some	interesting	stats	and	facts	about	our	Agile	Transformation:
– Big	Bang	approach	against	prevailing	wisdom	
– Went	from	project	driven	to	product	aligned
– 400+	scrum	teams	across	the	globe
– 500+	Change	Champions	and	165	Transformation	team	members
• Every	“industry	expert”	we	consulted	told	us	we	couldn’t	transform	at	this	scale	in	our	
designated	timeline	but	we	did	it!
I LOVE DEADLINES. I LIKE THE
WHOOSHING SOUND THEY MAKE AS
THEY FLY BY…
- Douglas	Adams
4
PayPal	SPLC	- Overview
5
Objective:	
Reduce	the	number	of	vulnerabilities	in	our	products	over	time	by	
building	repeatable/sustainable	proactive	security	practices	
embedded	within	our	PLC.
Customers	demand	and	deserve	better	security	and	privacy	in	their	software. PayPal	Secure	Product	Lifecycle	is	
the process	that	allows	PayPal	to	develop	and	test	products	to help reduce	security	bugs.
SPLC	Transformation
6
– Strategy
• Institutionalize	risk-based	thinking	and	processes
• Secure	by	Default	– Frameworks,	Dev.	Tools,	etc.
• Put	our	bots	to	work	
– Execution
• People	– Internal	PD	security	champions	to	help	drive	focus	and	attention	on	
software	security
• Process	– Integrate	seamlessly	with	our	“agile”	way	of	delivering	products.
• Technology	– Secure	frameworks,	libraries	and	automated	tools	that	enable	PD	to	
ship	products	rapidly	*and* securely
An	exercise	in	testing	(and	trusting)	the	automated	process
7
• Dynamic/In-Context	Security	Requirements:	Security	Stories	
• Automated	security	controls	in	the	lifecycle
• Secure	Frameworks	and	Security	Tools	used	for	all	projects	&		
human	involvement	for	critical-risk	projects
• Threat	Model	only	things	that	aren’t	run-of-the-mill	web	or	
mobile	apps	and/or	not	built	on	our	standardized	secure	
frameworks
Pre-requisite:	Security	Controls	Auto-enabled	to	Protect	
Developers	by	Default
8
• If	we	rely	on	*every*	developer	in	an	enterprise	doing	the	right	thing	from	a	security	
perspective	*every*	time	he/she	writes	code,	we	are	doomed	to	fail!
• Wherever	possible,	security	controls	are	to	be	made	available	automatically	and	turned	ON	by	
default
• Developers	have	go	out	of	their	way	to	turn	off	security	controls
• Secure-by-default	in	all	layers	
– Perimeter
– Infrastructure
– Framework
– Libraries
– Dev.	Tools
– Code/Config
IT IS A MISTAKE TO THINK YOU
CAN SOLVE ANY MAJOR
PROBLEM JUST WITH POTATOES.
- Douglas	Adams
9
Security	Stories
10
Holy	Grail	for	any	software	security	professional	è Make	functional	and	non-
functional	requirements	equal	citizens
In	Agile	Speak:	Make	User	Stories	and	Security	Stories	equal	citizens
Before: After:
Your	Favorite	Tax	
Software!
The	approach…
11
• A	web-based	tool	that	seamlessly	plugs	into	our	Quarterly	Release	Planning	(aka	
Multi-Sprint	Planning)	process
• A	simple	survey	that	does	light-weight	threat	modelling,	generates	security	stories,	
and	places	them	in	the	backlog	of	the	scrum	team
• Tracking	and	reporting	from	within	our	Agile	LifeCycle	Management	(ALM)	tool
What	were	our	initial	design	goals?
12
• We	should	go	where	they	are	and	not	make	them	come	back	to	our	tool	on	a	
daily	basis
• Two-way	sync	with	our	enterprise	ALM	tool
• It	shouldn’t	take	more	than	15	minutes	for	any	product	developer	to	complete	
the	survey
• Don’t	slow	them	down!
• Comprehensive	generic	but	“actionable”	guidance	for	most	technology	stacks	
• Useful	for	non-standard	apps	and	acquisitions
What	makes	a	good	security	story?
13
• A	good	security	story	should	be	“actionable”	bite-sized	chunk	that	can	implemented	by	
any	developer
• It	should	have	clear	usage	guidelines	for	your	own	security	APIs,	frameworks,	libraries,	
etc.
• Where	needed,	it	should	provide	secure	code	snippets,	reusable	secure	config	
examples	for	your	custom	frameworks,	etc.
• It	should	speak	developer	lingo	and	not	security	lingo!
• It	should	have	a	well-defined	“acceptance	criteria”	or	better	yet	automate	acceptance	
with	security	tests	(static/dynamic,	etc.)	in	the	CI	pipeline
• Clearly	call	out	every-sprint	vs	one-time	stories
• In	short,	the	developers	should	be	able	to	do	it	themselves	without	having	to	ping	the	
security	team	for	well-established	patterns	and	approved	security	controls
A LEARNING EXPERIENCE IS ONE OF
THOSE THINGS THAT SAYS, “YOU KNOW
THAT THING YOU JUST DID? DON'T DO
THAT.”
- Douglas	Adams
1
Pitfalls,	Gotchas,	etc.
15
• Don’t	overload	your	developers	with	100s	of	security	stories
• Figure	out	your	own	Top	10	(Not	OWASP	Top	10)	and	focus	on	that
• Don’t	hardcode	guidance	that	could	potentially	change	frequently	(e.g.	APIs)
• Hyperlink	instead	;)
• Prioritize	all	security	stories	– High,	Medium,	Low
• Mandate	only	High	priority	stories	to	be	completed	initially
• Don’t	try	to	boil	the	ocean	- Getting	the	culture	going	is	more	important	
• Expect	security	stories	to	be	moved	around	in	your	ALM	tool	(multiple	scrum	
teams	could	be	working	on	the	same	app!)
• Make	sure	two-way	sync	doesn’t	break
So,	what	does	it	look	like?
16
So,	what	does	it	look	like?
17
How	do	we	measure	success?
18
• Wide	adoption	of	the	tool	across	all	of	our	Product	Development	(PD)	organization	
• Not	just	adoption	but	also	efficacy	– are	developers	also	completing	the	security	stories	or	are	they	just	sitting	in	the	
backlog?
• Automated	SPLC	dashboard	that	makes	these	metrics	transparent	to	PD	leadership
• Early	engagement	means	no	or	minimal	projects	hit	security	roadblocks	during	launch
• A	quote	from	our	Android	App’s	Team	Manager:
“It	is	great	to	know	that	the	pentest	didn’t	find	any	blockers	and	it	can	be	largely	attributed	to	the	
fact	that	we	are	following	SPLC…”
In	a	Nutshell
19
Legacy	SPLC Agile	Transformed	SPLC
200+	PDF/HTML security	standards	and	
procedures
Security	Stories customized	for	the	specific	
use	case/feature
Manual gates	throughout	lifecycle Lifecycle	relies on	automated	controls
Human	involvement for	all	projects Let	the	frameworks	and	tools	do the	heavy	
lifting	- human	involvement	for	critical	risk	
projects	only
Threat Model	everything Lightweight Threat	Model	via	self-service	tool
Human	Threat	Model	only where	needed
I REFUSE TO ANSWER THAT QUESTION ON THE GROUNDS
THAT I DON'T KNOW THE ANSWER!
- Douglas	Adams
2
Questions?
WE NO LONGER THINK OF CHAIRS AS TECHNOLOGY; WE JUST
THINK OF THEM AS CHAIRS. BUT THERE WAS A TIME WHEN
WE HADN'T WORKED OUT HOW MANY LEGS CHAIRS SHOULD
HAVE, HOW TALL THEY SHOULD BE, AND THEY WOULD OFTEN
'CRASH' WHEN WE TRIED TO USE THEM.
- Douglas	Adams
2
Thank	you!
Get	my	slides	immediately
community@alldaydevops.com
Take	the	DevSecOps Survey
bit.ly/DevSecOps-2017
Our	sponsors	speak	your	language…	DevOps.

More Related Content

PPTX
Agile Release Planning
PPTX
Building an AppSec Pipeline: Keeping your program, and your life, sane
PPTX
VSM - Value Stream Mapping for made-to-order manufacturing
PDF
DevSecOps What Why and How
KEY
Intro to Lean Software Development
PDF
The Definitive Guide to Implementing Shift Left Testing in QA
PPTX
Agile code quality metrics
PPT
Value stream mapping (future state)
Agile Release Planning
Building an AppSec Pipeline: Keeping your program, and your life, sane
VSM - Value Stream Mapping for made-to-order manufacturing
DevSecOps What Why and How
Intro to Lean Software Development
The Definitive Guide to Implementing Shift Left Testing in QA
Agile code quality metrics
Value stream mapping (future state)

What's hot (20)

PPTX
Agile and Lean Software Development
PDF
Agile QA Process
PDF
How Spotify reaches the 80%+ of satisfaction of the techies making developers...
PDF
What is Shift Left Testing.pdf
PPTX
PDF
Introduction to DevOps
PDF
DevSecOps
PDF
Shift left-testing
PDF
DevSecOps and the CI/CD Pipeline
PPTX
The 3 actual’s 3Gen
PDF
Kanban in 4 easy steps
PPTX
Introduction to story points
PDF
4 sdlc and stlc
PPTX
Lean Software Development: Values and Principles
PPTX
Software testing principles
PDF
Kks sre book_ch1,2
PDF
Why Large Scale Scrum (LeSS)?
PPTX
Design System Proposal
PPTX
QA Best Practices in Agile World_new
Agile and Lean Software Development
Agile QA Process
How Spotify reaches the 80%+ of satisfaction of the techies making developers...
What is Shift Left Testing.pdf
Introduction to DevOps
DevSecOps
Shift left-testing
DevSecOps and the CI/CD Pipeline
The 3 actual’s 3Gen
Kanban in 4 easy steps
Introduction to story points
4 sdlc and stlc
Lean Software Development: Values and Principles
Software testing principles
Kks sre book_ch1,2
Why Large Scale Scrum (LeSS)?
Design System Proposal
QA Best Practices in Agile World_new
Ad

Viewers also liked (20)

PPTX
Making Security Agile - Oleg Gryb
PDF
Breaking Bad Equilibruim - John Willis
PDF
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
PDF
Implementing DevOps in a Regulated Environment - DJ Schleen
PDF
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
PDF
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
PPTX
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
PDF
Ops Happens: DevOps Beyond Deployment - Damon Edwards
PDF
DevSecOps - Building Rugged Software
PDF
DevOps and IT security
PPTX
DevOps in a Regulated and Embedded Environment (AgileDC)
PPTX
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
PPTX
Empowering Application Security Protection in the World of DevOps
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
PDF
Integrating DevOps and Security
KEY
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
PPTX
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
PPT
Road to agile: federal government case study
Making Security Agile - Oleg Gryb
Breaking Bad Equilibruim - John Willis
What We Learned from Four Years of Sciencing the Crap Out of DevOps - Nicole ...
Implementing DevOps in a Regulated Environment - DJ Schleen
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Requirements Gathering for a Successful Rugged DevOps Implementation - Hasan ...
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Ops Happens: DevOps Beyond Deployment - Damon Edwards
DevSecOps - Building Rugged Software
DevOps and IT security
DevOps in a Regulated and Embedded Environment (AgileDC)
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Empowering Application Security Protection in the World of DevOps
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Integrating DevOps and Security
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
Implementing an Application Security Pipeline in Jenkins
Where Bits & Bytes Meet Flesh and Blood - Joshua Corman
Road to agile: federal government case study
Ad

Similar to Building Security In - A Tale of Two Stories - Laksh Raghavan (20)

PPTX
Agile and Scrum Basics
PDF
Agile Security—Field of Dreams
PPTX
Learn How to Design, Build and Map Services to Quantifiable Measurements in S...
PDF
Jira Service Desk for Internal Developer Support: It’s Not Just for IT Anymore!
PPTX
Owasp summit slides day 2
PDF
Accelerating OT - A Case Study
PDF
Agile Greece Summit 2017 - Lean Business Agility
PPTX
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
PPTX
Agile Development Process
PPTX
Machine Learning and Analytics Breakout Session
PDF
High-Performance Agile Testing in Software Development
PPTX
Splunk for Machine Learning and Analytics
PPTX
Splunk for Machine Learning and Analytics
PPTX
Machine Learning and Analytics Breakout Session
PDF
If I want a perfect cyberweapon, I'll target ERP - second edition
PPTX
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PDF
Life is but a Stream
PPTX
Machine Learning and Analytics Breakout Session
Agile and Scrum Basics
Agile Security—Field of Dreams
Learn How to Design, Build and Map Services to Quantifiable Measurements in S...
Jira Service Desk for Internal Developer Support: It’s Not Just for IT Anymore!
Owasp summit slides day 2
Accelerating OT - A Case Study
Agile Greece Summit 2017 - Lean Business Agility
Accelerate Troubleshooting and Reinvent Monitoring with Interactive Visualiza...
Agile Development Process
Machine Learning and Analytics Breakout Session
High-Performance Agile Testing in Software Development
Splunk for Machine Learning and Analytics
Splunk for Machine Learning and Analytics
Machine Learning and Analytics Breakout Session
If I want a perfect cyberweapon, I'll target ERP - second edition
SplunkLive! Munich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
PPT-Splunk-LegacySIEM-101_FINAL
Life is but a Stream
Machine Learning and Analytics Breakout Session

More from SeniorStoryteller (20)

PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
PPTX
NuGet Package Management Done Right
PPTX
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
PPTX
The End of Security as We Know It - Shannon Lietz
PPTX
Safely Removing the Last Roadblock to Continuous Delivery
PPTX
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
PDF
Heroes’ Journey: Learning from Successful DevOps Transformations
PPTX
Rugged DevOps: Aligning Your Team and Your Powers for Success
PPTX
Create Rugged Applications: Managing Your Software Supply Chain
PPTX
Aligning Your Team and Your Powers for Success
PPTX
Leveraging Nexus Repository Manager at the Heart of DevOps
PPTX
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
PDF
Guns, Germs and Microservices w/ John Willis and Josh Corman
PDF
What We Learned from Three Years of Sciencing the Crap Out of DevOps
PDF
Release Engineering and Rugged DevOps: An Intersection?
PDF
Ops Happen: Improve Security Without Getting in the Way
PDF
What We Learned from Three Years of Sciencing the Crap Out of DevOps
PPTX
The R.O.A.D to DevOps
PPTX
The Journey to DevSecOps
PDF
Building Security Controls around Attack Models
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
NuGet Package Management Done Right
Hero's Tookit: Start Your Rugged DevOps Journey with Nexus, Jenkins and Docker
The End of Security as We Know It - Shannon Lietz
Safely Removing the Last Roadblock to Continuous Delivery
Software Supply Chain Automation Removes Roadblocks to Rugged DevOps
Heroes’ Journey: Learning from Successful DevOps Transformations
Rugged DevOps: Aligning Your Team and Your Powers for Success
Create Rugged Applications: Managing Your Software Supply Chain
Aligning Your Team and Your Powers for Success
Leveraging Nexus Repository Manager at the Heart of DevOps
The DevOps Hero Toolkit: Nexus, Jenkins and Docker
Guns, Germs and Microservices w/ John Willis and Josh Corman
What We Learned from Three Years of Sciencing the Crap Out of DevOps
Release Engineering and Rugged DevOps: An Intersection?
Ops Happen: Improve Security Without Getting in the Way
What We Learned from Three Years of Sciencing the Crap Out of DevOps
The R.O.A.D to DevOps
The Journey to DevSecOps
Building Security Controls around Attack Models

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...

Building Security In - A Tale of Two Stories - Laksh Raghavan