SlideShare a Scribd company logo
Integrating
of Security
Activates in
Agile
Process
PRESENTER: ZUBAIR RAHIM
1
Presentation Outline 2
 What is security
 Why We need security
 Agile development
 What is Agile Security
 Agile Security Manifesto
 Integration of Security in Agile Development Method
 Integration Method
What is cyber security 3
 Cyber security or IT security, is the protection of
computer systems from the theft or damage to
their hardware, software or information, as well as
from disruption or misdirection of the services
they provide. (Wikipedia)
 It covers all aspects of ensuring the protection of
citizens, businesses and critical infrastructures
from threats that arise from their use of
computers and the Internet.
 CIA

Why We need security 4
MORE THAN 2.5 BILLION RECORDS
STOLEN 2017 ...
The 2003 loss estimates by these
firms range from $226 billion.
Agile Development
SUMMARY.JPG
Agile Security
6
 Today large parts of the
industry have shifted
software development
from a former waterfall
model to a more flexible
agile software
development process.
 So the industry experience,
identify what practices
from mature SE processes
are easily integrated and
also provide a benefit to
agile projects.
Cigital’s “Agile Security Manifesto” 7
Rely on good
developers and
testers over security
specialists
01
Implement secure
architecture over
adding security
features afterwards
02
Continuously
improve security over
completely changing
processes
03
Focus on fixing
software over finding
bugs
04
Integration of Security in
Agile Development
Method
8
 The four highly profile SE
processes
1. Microsoft SDL,
2. Cigital Touchpoints,
3. Common Criteria and
4. CLASP are investigated.
 Based on these investigations a
total of 41 security activities are
obtained.
9
Cigatel Touchpoints 10
 lightweight SE process
Common Criteria
 International set of guidelines and specifications developed for evaluating
information security products.
 ISO certified
 Requirements
 Security Requirements
 Agree on definitions
 Design
 Risk Analyses
 Critical Assets
 UMLSec
 Requirements Inspection
 Release
 Repository Improvement
11
CLASP
12
 Comprehesive,
Lightweight Application
Security Process
Comparison of
secure software
development
standards and
models
13
Integration Method
 It is good to use these security activities for a secure software
development but may be with the integration of some heavy weight
activities may lead to loss of agility of a process. To handle the issue of
Integration of agile and security issue a flow chart is introduce.
14
15
16

More Related Content

PPTX
Deep secure holistic protection for ICS
PDF
Cybersecurity Summit 2020 Slide Deck
PPTX
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
PDF
Iio t security std
PPTX
2019 Infosec World Keynote
PDF
Cloud native patterns antipatterns
PDF
Cybersecurity for Field IIoT Networks
PPTX
Cybersecurity automation
Deep secure holistic protection for ICS
Cybersecurity Summit 2020 Slide Deck
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
Iio t security std
2019 Infosec World Keynote
Cloud native patterns antipatterns
Cybersecurity for Field IIoT Networks
Cybersecurity automation

What's hot (20)

PPTX
ICS (Industrial Control System) Cybersecurity Training
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
Limitless xdr meetup
PDF
Conferencia principal: Evolución y visión de Elastic Security
PDF
Operationalize with alerting, custom dashboards, and timelines
PPTX
ISO/IEC 27032 – Guidelines For Cyber Security
PDF
Elastic SIEM (Endpoint Security)
PPTX
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
PPTX
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
PPTX
Securing the ‘Wild Wild West’: USM for Universities
PPTX
Industrial Cyber Security: What is Application Whitelisting?
PDF
The Firewall Policy Hangover: Alleviating Security Management Migraines
PDF
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
PDF
Friday Forum ISO 27001: 2013
PDF
Security Starts at the Endpoint
PPTX
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
PPT
Integrating Multiple IT Security Standards
PDF
Palestra de abertura: Evolução e visão do Elastic Security
PPTX
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
DOCX
Infosecforce security services
ICS (Industrial Control System) Cybersecurity Training
Cybersecurity in Industrial Control Systems (ICS)
Limitless xdr meetup
Conferencia principal: Evolución y visión de Elastic Security
Operationalize with alerting, custom dashboards, and timelines
ISO/IEC 27032 – Guidelines For Cyber Security
Elastic SIEM (Endpoint Security)
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing the ‘Wild Wild West’: USM for Universities
Industrial Cyber Security: What is Application Whitelisting?
The Firewall Policy Hangover: Alleviating Security Management Migraines
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Friday Forum ISO 27001: 2013
Security Starts at the Endpoint
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Integrating Multiple IT Security Standards
Palestra de abertura: Evolução e visão do Elastic Security
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
Infosecforce security services
Ad

Similar to Integrating of security activates in agile process (20)

PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PDF
Comparitive Analysis of Secure SDLC Models
PPTX
Secure Software Development Lifecycle
 
PPTX
111.pptx
PDF
F_DR_Dark Reading Editorial Report_March 2022.pdf
PDF
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
PDF
Assurance-Level Driven Method for Integrating Security into SDLC Process
PDF
OT Security Architecture & Resilience: Designing for Security Success
PPTX
Secure DevOPS Implementation Guidance
PDF
Building a Product Security Practice in a DevOps World
PDF
4-lessons-of-security-leaders-for-2022.pdf
PPT
The best way to use ISO 27001
PDF
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
PDF
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
PDF
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PDF
Agile Product Development for IoT Best Practices.pdf
PDF
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
PDF
Accelerating OT - A Case Study
PDF
Cybersecurity in Oil & Gas Company
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Comparitive Analysis of Secure SDLC Models
Secure Software Development Lifecycle
 
111.pptx
F_DR_Dark Reading Editorial Report_March 2022.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Assurance-Level Driven Method for Integrating Security into SDLC Process
OT Security Architecture & Resilience: Designing for Security Success
Secure DevOPS Implementation Guidance
Building a Product Security Practice in a DevOps World
4-lessons-of-security-leaders-for-2022.pdf
The best way to use ISO 27001
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
Agile Product Development for IoT Best Practices.pdf
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Accelerating OT - A Case Study
Cybersecurity in Oil & Gas Company
Ad

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
sap open course for s4hana steps from ECC to s4
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Integrating of security activates in agile process

  • 2. Presentation Outline 2  What is security  Why We need security  Agile development  What is Agile Security  Agile Security Manifesto  Integration of Security in Agile Development Method  Integration Method
  • 3. What is cyber security 3  Cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. (Wikipedia)  It covers all aspects of ensuring the protection of citizens, businesses and critical infrastructures from threats that arise from their use of computers and the Internet.  CIA 
  • 4. Why We need security 4 MORE THAN 2.5 BILLION RECORDS STOLEN 2017 ... The 2003 loss estimates by these firms range from $226 billion.
  • 6. Agile Security 6  Today large parts of the industry have shifted software development from a former waterfall model to a more flexible agile software development process.  So the industry experience, identify what practices from mature SE processes are easily integrated and also provide a benefit to agile projects.
  • 7. Cigital’s “Agile Security Manifesto” 7 Rely on good developers and testers over security specialists 01 Implement secure architecture over adding security features afterwards 02 Continuously improve security over completely changing processes 03 Focus on fixing software over finding bugs 04
  • 8. Integration of Security in Agile Development Method 8  The four highly profile SE processes 1. Microsoft SDL, 2. Cigital Touchpoints, 3. Common Criteria and 4. CLASP are investigated.  Based on these investigations a total of 41 security activities are obtained.
  • 9. 9
  • 10. Cigatel Touchpoints 10  lightweight SE process
  • 11. Common Criteria  International set of guidelines and specifications developed for evaluating information security products.  ISO certified  Requirements  Security Requirements  Agree on definitions  Design  Risk Analyses  Critical Assets  UMLSec  Requirements Inspection  Release  Repository Improvement 11
  • 14. Integration Method  It is good to use these security activities for a secure software development but may be with the integration of some heavy weight activities may lead to loss of agility of a process. To handle the issue of Integration of agile and security issue a flow chart is introduce. 14
  • 15. 15
  • 16. 16

Editor's Notes

  • #7: SecDev checlilist: https://www.sqreen.com/checklists/devops-security-checklist It’s an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your application's design, meet your company's security objectives, and reduce risk.
  • #8: 2- Use SMEs to develop security features – E.g. authentication, authorization, data validation, crypto, etc Focus on fixing software over finding bugs • Penetration testing, secure code review etc. find issues, but they don’t magically fix them for you • Automated security tools are great at findings issues…… even if the issue doesn’t exist! – And they don’t fix the issues for you • Apply a risk-based approach to focus development effort on the issues that matter and that cannot be handled through other means – E.g. business process, contracts, monitoring, etc. • Use the development backlog to communicate and prioritise issues that need to be remediated
  • #9: A comprehensive approach for agile development method selection and security enhancement A Sharma, RK Bawa - Proceedings of the International Journal of …, 2016 - ijiet.com
  • #11: https://betanews.com/2016/07/21/new-approach-agile-security/
  • #12: (Mellado, Fernandez-Medina, and Piattini 2006).
  • #14: https://www.researchgate.net/publication/267704821_Review_on_Common_Criteria_as_a_Secure_Software_Development_Model
  • #15: A comprehensive approach for agile development method selection and security enhancement A Sharma, RK Bawa - Proceedings of the International Journal of …, 2016 - ijiet.com