SlideShare a Scribd company logo
Navigating Agile
automotive software
development
June 24, 2015
Presenters
Jeff Hildreth, Automotive Account Manager
Rogue Wave Software
Ahmed Abdelrahman, Release Engineer
Rogue Wave Software
John Chapman, Solutions Architect
Rogue Wave Software
2© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
Agenda
• A holistic approach to cybersecurity
• Blending DevOps and Agile for security
• How to implement a Jenkins CI system
• Examples of security defects
• Q&A
3© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
A holistic approach to
cybersecurity
A holistic approach to cybersecurity
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 5
Information overload
Develop an adaptive threat
model
Threat
Model
External
Data
Internal
Threat
Metric
Action
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 6
Threat model
Most breaches result from input trust issues
Threat modeling identifies, quantifies, and addresses
security risks by:
1. Understanding the application & environment
2. Identifying & prioritizing threats
3. Determining mitigation actions
Identify
assets
System
overview
Decompose
application
Identify
threats
Prioritize
threats
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 7
Security overload
News
Blogs, social media
conferences
Security standards
OWASP, CWE, CERT, etc.
Senator Markey report
NVD, White Hat, Black Hat OEMs, internal
Media More and more software running inside
your car
Standards and legislation
Research Requirements
Developers don’t know security
(80% failed security knowledge survey)
Developing a threat metric
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 8
Build score
• Automated and functional testing can give you a pass fail metric on every
run of the test suite
• A metric can be generated from penetration testing based on the number
of exploitable paths in your code base
• Software quality tools can give you a count of critical static analysis and
compiler warnings
• A metric can be developed based on the presence of snippets of open
source code previously undetected or open source with new known
vulnerabilities
• All of these metrics can be generated on every build of your software
DevOps & Agile for
security
Agile development: Integrated
security
© 2015 Rogue Wave Software, Inc. All Rights Reserved. 10
Adaptive
Accept
Sprint 1
Sprint 2
Sprint n
Release
Change
Adjust and Track
Feedback
Review
Next Iteration
No!
Yes!
Release
to
Market
Integrate
and Test
Integrate
and Test
Integrate
and Test
Multiple testing
points
Rapid feedback
required
“Outside” testing
does not meet
Agile needs
DevOps SDLC
11
Continuous
Integration
SDLC Step
UAT/
exploratory
testing
Functional
testing
Performance
load security
Release Deploy
Metric
Understand
Needs
Invent
Solution
Develop
Build
Commit
Idea
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
Jenkins CI
Jenkins CI
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 13
Security example
Load, Performance, Security…Testing phase
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 15
Load, Performance,
Security, … Testing
Develop, commit & build
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 16
Develop, commit & build
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 17
DevOps SDLC
18
Continuous
Integration
SDLC Step
UAT/
exploratory
testing
Functional
testing
Performance
load security
Release Deploy
Metric
Understand
Needs
Invent
Solution
Develop
Build
Commit
Idea
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
Conclusions
© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 19
The application security world is fluid
Create concrete,
actionable strategies
(Threat Metric, analysis & scanning)
Delivery cycles are short
Update regularly with
well-defined process
(Agile, CI)
See us in action:
www.roguewave.com
Jeff Hildreth | jeff.hildreth@roguewave.com
Q&A
Navigating agile automotive software development

More Related Content

PPT
Agile adoption for automotive systems software
PDF
Agile + ISO 26262: Using Agile in Automotive Development
PPTX
Frequently Asked Question (FAQ's) on ISO 26262 Functional Safety
PDF
How to Achieve Functional Safety in Safety-Citical Embedded Systems
PDF
Kashvi Consultants Technology SBU Profile
PDF
Managing Traceability in an Agile, Safety-critical Development Environment
PPTX
Automotive Functional Safety ISO 26262 Training Bootcamp - Tonex Training
PDF
5 Principles to Managing Your Application Lifecycle with SpiraTeam
Agile adoption for automotive systems software
Agile + ISO 26262: Using Agile in Automotive Development
Frequently Asked Question (FAQ's) on ISO 26262 Functional Safety
How to Achieve Functional Safety in Safety-Citical Embedded Systems
Kashvi Consultants Technology SBU Profile
Managing Traceability in an Agile, Safety-critical Development Environment
Automotive Functional Safety ISO 26262 Training Bootcamp - Tonex Training
5 Principles to Managing Your Application Lifecycle with SpiraTeam

What's hot (20)

PDF
Agile Automotive (Final)
PPTX
ISO 26262 Unit Testing | Functional Safety in Automotive
PDF
Sa fe 4.0 implementing Enterprise Agile using the Scaled Agile Framework
PDF
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
PPTX
Automotive functional safety iso 26262 training bootcamp 2019
PPTX
Inflectracon2020: Advantages of Integrating a DevSecOps Pipeline with the Spi...
PDF
Moving Towards Operability & Organising for Continuous Delivery
PDF
Qualification of Eclipse-based Tools according to ISO 26262
PPTX
Methodologies 3: Using Spira for Waterfall
PPTX
ISO 26262 introduction
PPTX
Building Quality into Your DevSecOps Pipelines
PPTX
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
PPTX
Rapise Overview Presentation (2021)
PPTX
Aligning QMS and Engineering Processes in Medical Product Development
PPTX
Friends & Foes of Software Test Automation - Test Automation, Demystified | W...
PPTX
27 Nov 2019 – Experts Talk: Integrated MedTech Delivery from Requirements thr...
PPTX
SpiraTeam Overview Presentation (2019)
PPTX
SpiraTest Overview Presentation (2022)
PPTX
1, 2, 3 build - continuous integration for mobile apps
PPTX
Program And Portfolio Management
Agile Automotive (Final)
ISO 26262 Unit Testing | Functional Safety in Automotive
Sa fe 4.0 implementing Enterprise Agile using the Scaled Agile Framework
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Automotive functional safety iso 26262 training bootcamp 2019
Inflectracon2020: Advantages of Integrating a DevSecOps Pipeline with the Spi...
Moving Towards Operability & Organising for Continuous Delivery
Qualification of Eclipse-based Tools according to ISO 26262
Methodologies 3: Using Spira for Waterfall
ISO 26262 introduction
Building Quality into Your DevSecOps Pipelines
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Rapise Overview Presentation (2021)
Aligning QMS and Engineering Processes in Medical Product Development
Friends & Foes of Software Test Automation - Test Automation, Demystified | W...
27 Nov 2019 – Experts Talk: Integrated MedTech Delivery from Requirements thr...
SpiraTeam Overview Presentation (2019)
SpiraTest Overview Presentation (2022)
1, 2, 3 build - continuous integration for mobile apps
Program And Portfolio Management
Ad

Similar to Navigating agile automotive software development (20)

PDF
Create code confidence for better application security
PPTX
The road towards better automotive cybersecurity
PPTX
Perforce on Tour 2015 - Grab Testing By the Horns and Move
PDF
Top 5 best practice for delivering secure in-vehicle software
PPTX
Shifting the conversation from active interception to proactive neutralization
PPTX
Cybersecurity overview - Open source compliance seminar
PPTX
Create Agile confidence for better application security
PPTX
Secure SDLC in mobile software development.
PPTX
Create code confidence for better application security
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PDF
Applicaiton Security - Building The Audit Program
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PDF
From Development to Deployment- Embedding Security Testing in Every QA Stage.pdf
PPTX
Secure Software Development Lifecycle
 
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PPTX
How to go from waterfall app dev to secure agile development in 2 weeks
PDF
Agile Secure Software Development in a Large Software Development Organisatio...
Create code confidence for better application security
The road towards better automotive cybersecurity
Perforce on Tour 2015 - Grab Testing By the Horns and Move
Top 5 best practice for delivering secure in-vehicle software
Shifting the conversation from active interception to proactive neutralization
Cybersecurity overview - Open source compliance seminar
Create Agile confidence for better application security
Secure SDLC in mobile software development.
Create code confidence for better application security
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Applicaiton Security - Building The Audit Program
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
From Development to Deployment- Embedding Security Testing in Every QA Stage.pdf
Secure Software Development Lifecycle
 
Succeeding-Marriage-Cybersecurity-DevOps final
Security Culture from Concept to Maintenance: Secure Software Development Lif...
How to go from waterfall app dev to secure agile development in 2 weeks
Agile Secure Software Development in a Large Software Development Organisatio...
Ad

More from Rogue Wave Software (20)

PPTX
The Global Influence of Open Banking, API Security, and an Open Data Perspective
PPTX
No liftoff, touchdown, or heartbeat shall miss because of a software failure
PDF
Disrupt or be disrupted – Using secure APIs to drive digital transformation
PPTX
Leveraging open banking specifications for rigorous API security – What’s in...
PPTX
Adding layers of security to an API in real-time
PPTX
Getting the most from your API management platform: A case study
PPTX
Advanced technologies and techniques for debugging HPC applications
PPTX
The forgotten route: Making Apache Camel work for you
PPTX
Are open source and embedded software development on a collision course?
PDF
Three big mistakes with APIs and microservices
PPTX
5 strategies for enterprise cloud infrastructure success
PPTX
PSD2 & Open Banking: How to go from standards to implementation and compliance
PPTX
Java 10 and beyond: Keeping up with the language and planning for the future
PPTX
How to keep developers happy and lawyers calm (Presented at ESC Boston)
PPTX
Open source applied - Real world use cases (Presented at Open Source 101)
PPTX
How to migrate SourcePro apps from Solaris to Linux
PPTX
Approaches to debugging mixed-language HPC apps
PPTX
Enterprise Linux: Justify your migration from Red Hat to CentOS
PPTX
Walk through an enterprise Linux migration
PPTX
How to keep developers happy and lawyers calm
The Global Influence of Open Banking, API Security, and an Open Data Perspective
No liftoff, touchdown, or heartbeat shall miss because of a software failure
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Leveraging open banking specifications for rigorous API security – What’s in...
Adding layers of security to an API in real-time
Getting the most from your API management platform: A case study
Advanced technologies and techniques for debugging HPC applications
The forgotten route: Making Apache Camel work for you
Are open source and embedded software development on a collision course?
Three big mistakes with APIs and microservices
5 strategies for enterprise cloud infrastructure success
PSD2 & Open Banking: How to go from standards to implementation and compliance
Java 10 and beyond: Keeping up with the language and planning for the future
How to keep developers happy and lawyers calm (Presented at ESC Boston)
Open source applied - Real world use cases (Presented at Open Source 101)
How to migrate SourcePro apps from Solaris to Linux
Approaches to debugging mixed-language HPC apps
Enterprise Linux: Justify your migration from Red Hat to CentOS
Walk through an enterprise Linux migration
How to keep developers happy and lawyers calm

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
history of c programming in notes for students .pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
medical staffing services at VALiNTRY
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Nekopoi APK 2025 free lastest update
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPT
Introduction Database Management System for Course Database
PPTX
ai tools demonstartion for schools and inter college
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Introduction to Artificial Intelligence
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Understanding Forklifts - TECH EHS Solution
history of c programming in notes for students .pptx
Odoo Companies in India – Driving Business Transformation.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
wealthsignaloriginal-com-DS-text-... (1).pdf
medical staffing services at VALiNTRY
Computer Software and OS of computer science of grade 11.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
Nekopoi APK 2025 free lastest update
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Introduction Database Management System for Course Database
ai tools demonstartion for schools and inter college
Softaken Excel to vCard Converter Software.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Designing Intelligence for the Shop Floor.pdf
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Introduction to Artificial Intelligence
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool

Navigating agile automotive software development

  • 2. Presenters Jeff Hildreth, Automotive Account Manager Rogue Wave Software Ahmed Abdelrahman, Release Engineer Rogue Wave Software John Chapman, Solutions Architect Rogue Wave Software 2© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
  • 3. Agenda • A holistic approach to cybersecurity • Blending DevOps and Agile for security • How to implement a Jenkins CI system • Examples of security defects • Q&A 3© 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
  • 4. A holistic approach to cybersecurity
  • 5. A holistic approach to cybersecurity © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 5 Information overload Develop an adaptive threat model Threat Model External Data Internal Threat Metric Action
  • 6. © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 6 Threat model Most breaches result from input trust issues Threat modeling identifies, quantifies, and addresses security risks by: 1. Understanding the application & environment 2. Identifying & prioritizing threats 3. Determining mitigation actions Identify assets System overview Decompose application Identify threats Prioritize threats
  • 7. © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 7 Security overload News Blogs, social media conferences Security standards OWASP, CWE, CERT, etc. Senator Markey report NVD, White Hat, Black Hat OEMs, internal Media More and more software running inside your car Standards and legislation Research Requirements Developers don’t know security (80% failed security knowledge survey)
  • 8. Developing a threat metric © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 8 Build score • Automated and functional testing can give you a pass fail metric on every run of the test suite • A metric can be generated from penetration testing based on the number of exploitable paths in your code base • Software quality tools can give you a count of critical static analysis and compiler warnings • A metric can be developed based on the presence of snippets of open source code previously undetected or open source with new known vulnerabilities • All of these metrics can be generated on every build of your software
  • 9. DevOps & Agile for security
  • 10. Agile development: Integrated security © 2015 Rogue Wave Software, Inc. All Rights Reserved. 10 Adaptive Accept Sprint 1 Sprint 2 Sprint n Release Change Adjust and Track Feedback Review Next Iteration No! Yes! Release to Market Integrate and Test Integrate and Test Integrate and Test Multiple testing points Rapid feedback required “Outside” testing does not meet Agile needs
  • 11. DevOps SDLC 11 Continuous Integration SDLC Step UAT/ exploratory testing Functional testing Performance load security Release Deploy Metric Understand Needs Invent Solution Develop Build Commit Idea © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
  • 13. Jenkins CI © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 13
  • 15. Load, Performance, Security…Testing phase © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 15 Load, Performance, Security, … Testing
  • 16. Develop, commit & build © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 16
  • 17. Develop, commit & build © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 17
  • 18. DevOps SDLC 18 Continuous Integration SDLC Step UAT/ exploratory testing Functional testing Performance load security Release Deploy Metric Understand Needs Invent Solution Develop Build Commit Idea © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED
  • 19. Conclusions © 2015 ROGUE WAVE SOFTWARE, INC. ALL RIGHTS RESERVED 19 The application security world is fluid Create concrete, actionable strategies (Threat Metric, analysis & scanning) Delivery cycles are short Update regularly with well-defined process (Agile, CI)
  • 20. See us in action: www.roguewave.com Jeff Hildreth | jeff.hildreth@roguewave.com
  • 21. Q&A

Editor's Notes

  • #11: In an Agile environment, release cycles may be measured in days rather than weeks, making testing for security and compliance more challenging. Agile requires frequent testing and rapid, continuous feedback. Shipping code to a separate group for testing, and receiving results days later, will break the Agile model. To be successful in an Agile environment, compliance and security testing and feedback must be integrated with the rest of the Agile team. Note, with Agile, “Release to Market” doesn’t always mean an external release, Potentially shippable increment, or PSI, and minimum viable product (MVP) are two terms used to describe what may or may not be released to customers. When we examine the process, testing is brought in throughout the development lifecycle, rather than waiting until the development is complete. For this reason, testers are typically part of the Agile teams, and testing user stories are built into the backlog from the outset of the sprint, or iteration.
  • #14: http://www.edn.com/design/automotive/4423428/Toyota-s-killer-firmware--Bad-design-and-its-consequences An example of unintended behavior introduced via a supplier.
  • #16: http://www.edn.com/design/automotive/4423428/Toyota-s-killer-firmware--Bad-design-and-its-consequences An example of unintended behavior introduced via a supplier.
  • #17: http://www.edn.com/design/automotive/4423428/Toyota-s-killer-firmware--Bad-design-and-its-consequences An example of unintended behavior introduced via a supplier.
  • #18: http://www.edn.com/design/automotive/4423428/Toyota-s-killer-firmware--Bad-design-and-its-consequences An example of unintended behavior introduced via a supplier.
  • #20: http://www.edn.com/design/automotive/4423428/Toyota-s-killer-firmware--Bad-design-and-its-consequences An example of unintended behavior introduced via a supplier.