SlideShare a Scribd company logo
BRIDGING THE GAP BETWEEN SECURITY AND
DEVELOPMENT WITH YOUR HOST - @_NOID_
It’s Not a Bug,
It’s a Feature
#whoami
Information Security dude with 25 years
of experience
Been hacking much longer than that
I’ve been through the
InfoSec cycle
Panic
arrogance
confusion
understanding
???
Our story begins
WHEREIN OUR HERO HAS NO CLUE AS TO WHAT HE’S DOING
Story Time: I
realize there’s
a problem
 Working in a centralized security organization
for a big company
 Development orgs won’t give us the time of day.
They don’t show up for meetings. They seemingly
thumb their noses at us, often with management
approval! The fiends!
 We’re dictating requirements from our ivory
towers it seems
 We’re very proud of our processes and
documentation
 No one but us seems to have seen it, read it, or
even know about it
 Release cycles? Sprints? WTF are you going on
about?
What did I
learn?
Developers are motivated by
different things than Security
people
Security people help the business manage
risk
Developers are focused on product/feature
development
Meet with the people you’re
drafting requirements for
Do the requirements make sense?
Do they understand the requirements?
Make sure there is a clear, 2 way path for communications
Be aware of sprint/release
timelines
Want an easy win? Be respectful and
protective of DevOrg time
Sit in planning meetings, even if you initially
have nothing to contribute
Play “secret shopper” with your security org
What do we win by
playing?
WHEREIN OUR HERO ABANDONS HIS TRIBE AND FIGHTS FOR THE
DEVELOPERS
Story Time:
We have to
do what now?
 Large external security organization comes to us with a
new “compliance framework” they want us to build
things against
 This framework didn’t solve any problems we had nor
did it improve our security posture or expand our ability
to onboard new customers
 Many of the requirements weren’t applicable to our
service, many didn’t make sense
 So I had to ask “What do we win by playing?”
 The answer: Nothing. You have to do it
 Management told us to ignore it and get back to
work…so we did
Lessons
Learned
There was a huge missed opportunity for a security “win” here
If you want to change the way things get done, reduce complexity
and increase efficiency. No process for processes sake
Communicate with the people you’re going to be pushing
requirements on. Do it early and often!
Show the developers the value they will get from adopting this new
way of doing business
“Big stick compliance” doesn’t work. It’s never worked.
One of Us
WHEREIN OUR HERO FINALLY STARTS TO “GET IT” AND BEGINS TO
BRIDGE THE GAP
Story Time:
The lightbulb
goes on!
 Tasked with conducting a massive threat model for our product
 A decade of technical debt
 Minimal interest from development (and some hostility too)
 A ray of hope appears! A dev with a security background!
 “I never knew security could generate so much feature work”
 First successful threat model has the developer singing my praises
 With a wink and a nod, other developers are now interested too
 Final result: 500 feature enhancements/changes logged
 Bonus: New development standards/requirements for new features
Lessons
Learned
Language makes all the
difference in the world
“I never knew threat modeling
would generate so much feature
work!”
Look for the helpers
Find the people who have the
influence you might be lacking and
get them on your side
Don’t talk about security, talk
about feature development
For many devs security work = “bug
fixes”
Threat model with your developers!
To wrap it all up
 Engage early and often
 Make sure the right people are at the table when
decisions are made
 Speak to developers in language they understand and
value
 Talk in terms of features, not bugs
 Talk in terms of benefits, not consequences
 Speak on behalf of the customer, not security
 Leverage security features to help developers expand the
adoption of their product or improve its reliability
 If you can, avoid even using the word security
Contact Info
Email = noid23@gmail.com
Telegram = @noid23
Twitter = @_noid_
Github* = github.com/noid23
*I’ll put my slides up there later

More Related Content

PPTX
How technology has effected managers and employees today 1
PDF
Product Design - Rui Barroca
PDF
The Essentials of Great Product Design
PPTX
2010 02 19 the lean startup - webstock 2010
PPTX
5 Myths and Realities
PPTX
5myths_realitiesandbecominggreattesters
PDF
Software Project management
PPTX
Minimum Viable Product
How technology has effected managers and employees today 1
Product Design - Rui Barroca
The Essentials of Great Product Design
2010 02 19 the lean startup - webstock 2010
5 Myths and Realities
5myths_realitiesandbecominggreattesters
Software Project management
Minimum Viable Product

What's hot (20)

PDF
Tester vs Developer
PPTX
2009 09 08 The Lean Startup Gov 2.0 Summit Edition
PDF
PopcornFlow: Continuous Evolution Through Ultra-Rapid Experimentation
PDF
10 Reasons Why You Fix Bugs As Soon As You Find Them
PPT
Lean Startup at IGN - presentation at SLLCONF 2011
PPTX
Eric Ries Lean Startup Schematic View Of Agile Development And Customer Devel...
PDF
Best Practices for Effective Website Testing & Optimization (Webinar)
PPT
Get Faster - While You're Getting Better
PDF
Remote business as usual
PDF
How to run a kick ass bug bounty program - Node Summit 2013
PDF
Building software that matters (Optional Conf 2014)
PDF
Invessed Webinar: Investor Portals are not Rocket Science
PPTX
The Lean Startup EA edition
PDF
Agile Testers: Becoming a key asset for your team
PDF
Year Zero
PDF
Lean Startup: How Development Looks Different at a Startup
PPT
Tester developer interaction
PDF
New Barriers of Transformation
PPTX
2010 10 28 the lean startup at ucsd
PDF
Scaling CTO / On Freund
Tester vs Developer
2009 09 08 The Lean Startup Gov 2.0 Summit Edition
PopcornFlow: Continuous Evolution Through Ultra-Rapid Experimentation
10 Reasons Why You Fix Bugs As Soon As You Find Them
Lean Startup at IGN - presentation at SLLCONF 2011
Eric Ries Lean Startup Schematic View Of Agile Development And Customer Devel...
Best Practices for Effective Website Testing & Optimization (Webinar)
Get Faster - While You're Getting Better
Remote business as usual
How to run a kick ass bug bounty program - Node Summit 2013
Building software that matters (Optional Conf 2014)
Invessed Webinar: Investor Portals are not Rocket Science
The Lean Startup EA edition
Agile Testers: Becoming a key asset for your team
Year Zero
Lean Startup: How Development Looks Different at a Startup
Tester developer interaction
New Barriers of Transformation
2010 10 28 the lean startup at ucsd
Scaling CTO / On Freund
Ad

Similar to Its not a bug it's a feature - Seattle B sides 2019 (20)

PDF
Building Security Teams
PPTX
BSidesSF talk: Overcoming obstacles in operationalizing security
PPTX
Great Expectations: A Secure Software Story - Open Source North
PPTX
How to develop an AppSec culture in your project
PPTX
Building an AppSec Culture
PPTX
5 Ways to Reduce 3rd Party Developer Risk
PPT
Software security engineering
PPT
Software security engineering
PDF
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
PDF
Treating Security Like a Product
PDF
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
PDF
Shift Left Security – Guidance on embedding security for a Digital Transforma...
PPT
Software Security Engineering
PPTX
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
ScotSecure 2020
PDF
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
PDF
AppSec in an Agile World
PDF
SDLC & DevSecOps
Building Security Teams
BSidesSF talk: Overcoming obstacles in operationalizing security
Great Expectations: A Secure Software Story - Open Source North
How to develop an AppSec culture in your project
Building an AppSec Culture
5 Ways to Reduce 3rd Party Developer Risk
Software security engineering
Software security engineering
Tactical Application Security: Getting Stuff Done - Black Hat Briefings 2015
Treating Security Like a Product
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Shift Left Security – Guidance on embedding security for a Digital Transforma...
Software Security Engineering
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Managing Application Security Risk in Enterprises - Thoughts and recommendations
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
ScotSecure 2020
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
AppSec in an Agile World
SDLC & DevSecOps
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Its not a bug it's a feature - Seattle B sides 2019

  • 1. BRIDGING THE GAP BETWEEN SECURITY AND DEVELOPMENT WITH YOUR HOST - @_NOID_ It’s Not a Bug, It’s a Feature
  • 2. #whoami Information Security dude with 25 years of experience Been hacking much longer than that I’ve been through the InfoSec cycle Panic arrogance confusion understanding ???
  • 3. Our story begins WHEREIN OUR HERO HAS NO CLUE AS TO WHAT HE’S DOING
  • 4. Story Time: I realize there’s a problem  Working in a centralized security organization for a big company  Development orgs won’t give us the time of day. They don’t show up for meetings. They seemingly thumb their noses at us, often with management approval! The fiends!  We’re dictating requirements from our ivory towers it seems  We’re very proud of our processes and documentation  No one but us seems to have seen it, read it, or even know about it  Release cycles? Sprints? WTF are you going on about?
  • 5. What did I learn? Developers are motivated by different things than Security people Security people help the business manage risk Developers are focused on product/feature development Meet with the people you’re drafting requirements for Do the requirements make sense? Do they understand the requirements? Make sure there is a clear, 2 way path for communications Be aware of sprint/release timelines Want an easy win? Be respectful and protective of DevOrg time Sit in planning meetings, even if you initially have nothing to contribute Play “secret shopper” with your security org
  • 6. What do we win by playing? WHEREIN OUR HERO ABANDONS HIS TRIBE AND FIGHTS FOR THE DEVELOPERS
  • 7. Story Time: We have to do what now?  Large external security organization comes to us with a new “compliance framework” they want us to build things against  This framework didn’t solve any problems we had nor did it improve our security posture or expand our ability to onboard new customers  Many of the requirements weren’t applicable to our service, many didn’t make sense  So I had to ask “What do we win by playing?”  The answer: Nothing. You have to do it  Management told us to ignore it and get back to work…so we did
  • 8. Lessons Learned There was a huge missed opportunity for a security “win” here If you want to change the way things get done, reduce complexity and increase efficiency. No process for processes sake Communicate with the people you’re going to be pushing requirements on. Do it early and often! Show the developers the value they will get from adopting this new way of doing business “Big stick compliance” doesn’t work. It’s never worked.
  • 9. One of Us WHEREIN OUR HERO FINALLY STARTS TO “GET IT” AND BEGINS TO BRIDGE THE GAP
  • 10. Story Time: The lightbulb goes on!  Tasked with conducting a massive threat model for our product  A decade of technical debt  Minimal interest from development (and some hostility too)  A ray of hope appears! A dev with a security background!  “I never knew security could generate so much feature work”  First successful threat model has the developer singing my praises  With a wink and a nod, other developers are now interested too  Final result: 500 feature enhancements/changes logged  Bonus: New development standards/requirements for new features
  • 11. Lessons Learned Language makes all the difference in the world “I never knew threat modeling would generate so much feature work!” Look for the helpers Find the people who have the influence you might be lacking and get them on your side Don’t talk about security, talk about feature development For many devs security work = “bug fixes” Threat model with your developers!
  • 12. To wrap it all up  Engage early and often  Make sure the right people are at the table when decisions are made  Speak to developers in language they understand and value  Talk in terms of features, not bugs  Talk in terms of benefits, not consequences  Speak on behalf of the customer, not security  Leverage security features to help developers expand the adoption of their product or improve its reliability  If you can, avoid even using the word security
  • 13. Contact Info Email = noid23@gmail.com Telegram = @noid23 Twitter = @_noid_ Github* = github.com/noid23 *I’ll put my slides up there later

Editor's Notes

  • #5: I once worked in a centralized security organization. We mandated requirements for software and services operating within our ecosystem. We never actively sought out feedback from the teams we pushed these requirements on to We never checked to see if there were easy paths for them to engage us when they had questions We didn't pay attention to their release timelines As a result we frequently came at these organizations from out of nowhere, with terrible timing, making demands that were laughable at best and service impacting at the worst These development organizations frequently ignored us or went around us, usually with managements blessing because we were hindering the development process while providing no value We sat in our ivory tower patting ourselves on the back for what a good job we were doing while disdainfully looking at the developers who were, in our opinion, just thumbing their noses at us. Within our organization everything looked like a well oiled machine, but externally it was next to impossible for orgs to reach out to us I left this org and ended up in a dev org working on a product that was, ironically enough, in this ecosystem I had just left One of my devs had spent 2 months trying to get 2 firewall ports opened so they could double the capacity of their dev lab. I did it in a week, but only because I went off the path and reached out to my old teams Within 3 months of joining the dev team I'd developed a strong resentment towards my old org because I now understood how out of touch they were. I now saw what a hinderance I'd been to this teams progress
  • #6: Developers don't hate you, they don't hate security, that's a cop out on our part Security people are rewarded for helping the business manage and mitigate risk. Periodically we’re rewarded for saving the day Developers are rewarded for designing, implementing, and shipping features. They are rewarded for helping the company save money and make it. Don’t design your security requirements in a vacuum. This particularly applies to centralized security organizations. Make sure the people who will be impacted are in the room. Get their feedback. Do the requirements make sense? Do the developers understand what’s driving the requirements? Make sure that there’s good, two way, communication between stakeholders. This might seem like a no-brainer, but you’d be surprised how many security organizations turn inwards and start doing things that impact others without talking to them. Echo chambers form quickly, especially in centralized security orgs, and especially when those orgs feel the developers are ignoring them The easiest way to build trust and friendship with developers is to show that you are respectful of their time. Increasingly they are under timelines that make InfoSec timelines seem reasonable. If you’re getting crickets from your developers or outright hostile pushback, there’s a very good chance that your timing is way off. You’re going to get two different reactions if you engage early in the planning cycle versus coming in unexpectedly at the end Play “secret shopper”. Sure, you think you’re easy to engage with. Sure you think everything is great and people should have no problems engaging with your organization, I mean look at how good all this documentation is! Well, periodically try to engage your organization through the very channels you push people to…you may be surprised. Turns out getting 2 ports opened on a firewall was next to impossible and the security org expected everyone to be happy with a multi-month turn around.
  • #8: Large external security organization comes to us with a “compliance framework” that we supposedly have to comply with Much like my last organization these requirements were drafted in a vacuum with no input from anyone else There was absolutely no benefit to snapping to this new, seemingly arbitrary compliance framework. It didn’t make us more secure, it didn’t increase our ability to onboard customers, it didn’t do anything but put a feather in this security organization’s cap. Most of the requirements weren’t applicable and some didn’t even make sense. Telling me I *HAVE* to do something when my own management doesn’t understand what you’re on about is a guaranteed way to fail
  • #9: There was a huge missed opportunity here. If this organization had met with the teams they were going to put this framework on and had learned about how their products and services were structured they could have built something great. My org was driven by several principals: Reducing complexity and increasing efficiency through automation Driving customer adoption and onboarding (grow or die) If this compliance framework has been able to help with these things, we could have built a beautiful partnership. For example if this compliance framework was accepted across the company and understood by people, I would have loved to incorporate it into our platform. Similar to being able to tell a customer “We’re ISO27001 compliant” or “Here’s our SOC2”. Being able to say “We’re OSComp Level 2 compliant” and have that mean something would remove hurdles to adoption Big stick compliance. The “you HAVE to do it” doesn’t work. More importantly it’s never worked, even though a lot of veteran security folks seem to vividly remember it working (Mandela Effect) All Big stick compliance does is create division. It reinforces that borderline hate between security and development. Don’t do it. If you see others doing it, tell them to stop.
  • #11: The product I was working on had between 30-40 separate moving parts to it This product had also never had any security oversight due to its internal nature, but it did have nearly a decade of technical debt My developers could care less about threat modeling. Some were even hostile to it because they knew it meant more work I found a dev lead that had previously worked on a security product and got him to humor me for a dry run of a TM session I asked him to explain to me how his service worked and how it interacted with other services As he began to diagram the service he’d periodically stop, change things, change them again, etc. When we finished he said “Get a picture of that. I think that’s the only true, accurate flow diagram we have of this service” We then started discussing the usual threat model stuff. Things like security boundaries. I would bring up customer onboarding requirements around TLS, logging, etc. Dev lead turns to me and says “I never realized how much feature work security could generate, this is great” That was the moment I realized I’d been going about this the wrong way all along. What I saw as issues to fix, he saw as features to develop/improve What I saw as compliance work I would have to “hard sell” he saw as ways to get customers onboarded faster Developer is now singing my praises, of course he’ll help me get others onboard When it was all said and done, 500 bug fixes/feature enhancements/changes were logged New development standards, such as requiring threat modeling are set in place!
  • #12: Speak in terms of feature development. If you can, avoid using the word ‘security’ at all. Most developers look at security work in terms of bug fixes, which distracts from work they get rewarded for Find that one developer that has a keen interest in security (there’s always one) and get them to help you drive your feature work with other developers Developers care about reliability, a lot. Seriously. Developers also care about product adoption. If no one is using the product, it will go away. Tie your requests in with these drivers Talk about product adoption. If we do these things then we can get these types of customers Threat model with your developers early and often. Let them see with their own eyes the value you’re providing as a security person They can see early on where they’re going to need to do work They can see issues now that they can fix in the design phase that would be a nightmare to fix in production They can get a great visual idea of how their service works. Often how it works in their head and how it really works are two different things
  • #13: Build trust and collaboration by starting constructive 2-way dialogue. Learn the product development cycles. Learn when it’s appropriate to engage the developers and when it’s not If you think you’re finished building out security requirements for your products and services but the product teams aren’t at the table, then you’re not done Speak to developers in terms of feature development. Most developers associate security work with “bug fixes”. Fixing bugs doesn’t fit their reward model, but feature development does Demonstrate that security features can drive customer adoption. Don’t say “You have to do this because of ISO27001 compliance”, instead say “If we implement this feature we will be able to offer this product/service to a wider customer base, including those that have ISO27001 compliance restrictions” Developers also care about reliability and performance, show how these features can improve those areas (Security is just a bonus!)