SlideShare a Scribd company logo
GOVERNANCE AS A
MISSING PART OF IT
SECURITY
ARCHITECTURE
WELL DESIGNED SECURITY
ARCHITECTURE
OWASP DAY POLAND 2
Technology:
Tooling
Processes:
How we do
Organization:
People (culture)
SECURITY
CI/CD
Technology
Organization
Processes
Source: Gartner 2017Sourve: Gartner 2017
HOW IT WORKS BY GARTNER
OWASP DAY POLAND 3
DEV/OPS 2.0DEV/OPS 2.0
HOW IT WORKS SO FAR
OWASP DAY POLAND 4
HUMAN ERROR
Human error means that something
has been done that was "not intended by
the actor; not desired by a set of rules or
an external observer; or that led the task
or system outside its acceptable limits".
In short, it is a deviation from intention,
expectation or desirability.
OWASP DAY POLAND 5
SO, THE QUESTION IS:
OWASP DAY POLAND 6
??
Process
A series of actions or steps
taken in order to achieve a
particular end
Process is not a bureaucracy
Automation
Process automation refers to
the use of digital technology to
perform a process or processes
in order to accomplish a
workflow or function.
OWASP DAY POLAND 7
GOVERNANCE
CAPABILITY MATURITY MODEL (CMM)
OWASP DAY POLAND 8
OWASP DAY POLAND 9
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Design
●
Threat modeling
●
Secure design
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Test
●
Vulnerability Assessment
●
Dynamic Analysis
●
Functional tests
●
QA
Develop
●
Code review
●
Unit testing
●
Static Analysis
Define
●
Code Standards
●
Security Non Functional
Requirements (SNFR)
Training
●
Secure Coding Practices
●
Writing security tests
●
Provider/Platform
Technical Training
SECURE DESIGN/DEVELOPMENT
OPS
KPI
OWASP DAY POLAND 10
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Design
●
Threat modeling
●
Secure design
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Test
●
Vulnerability Assessment
●
Dynamic Analysis
●
Functional tests
●
QA
Develop
●
Code review
●
Unit testing
●
Static Analysis
Define
●
Code Standards
●
Security Non Functional
Requirements (SNFR)
Training
●
Secure Coding Practices
●
Writing security tests
●
Provider/Platform
Technical Training
SECURE DESIGN/DEVELOPMENT
OPS
KPI
OWASP DAY POLAND 11
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Design
●
Threat modeling
●
Secure design
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Training
• Secure Coding Practices
• Writing security tests
• Provider/Platform
Technical Training
Test
●
Vulnerability Assessment
●
Dynamic Analysis
●
Functional tests
●
QA
Develop
●
Code review
●
Unit testing
●
Static Analysis
●
Dynamic Analysis
Define
●
Code Standards
●
Security Non Functional
Requirements (SNFR)
Training
●
Secure Coding Practices
●
Writing security tests
●
Provider/Platform
Technical Training
SECURE DESIGN/DEVELOPMENT
OPS
KPI KPIKPI
KPI
KPIKPIKPI
KPI
Source: Gartner 2017Sourve: Gartner 2017
HOW IT CAN WORK
OWASP DAY POLAND 12
DEV/OPS 2.0DEV/OPS 2.0
TITLE:
Let’s stay
in touch
Dariusz.Czerniawski@isaca.waw.pl
+48501056737
OWASP DAY POLAND 13

More Related Content

PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
PDF
[OPD 2019] Life after pentest
PDF
Red team-view-gaps-in-the-serverless-application-attack-surface
PPTX
AllDayDevOps 2019 AppSensor
PDF
Owasp top 10 2017 (en)
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
Owasp masvs spain 17
PPTX
[Wroclaw #5] OWASP Projects: beyond Top 10
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
[OPD 2019] Life after pentest
Red team-view-gaps-in-the-serverless-application-attack-surface
AllDayDevOps 2019 AppSensor
Owasp top 10 2017 (en)
Elizabeth Lawler - Devops, security, and compliance working in unison
Owasp masvs spain 17
[Wroclaw #5] OWASP Projects: beyond Top 10

What's hot (20)

PPTX
Mobile Security at OWASP - MASVS and MSTG
PPTX
Stephen Sadowski - Securely automating infrastructure in the cloud
PPTX
Application Security Logging with Splunk using Java
PDF
Beyond the mcse red teaming active directory
PDF
Dev secops on the offense automating amazon web services account takeover
PDF
Security in CI/CD Pipelines: Tips for DevOps Engineers
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PDF
Dev seccon london 2016 intelliment security
PDF
The Dev, Sec and Ops of API Security - API World
PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PDF
Red Team vs. Blue Team on AWS
PDF
Top API Security Issues Found During POCs
PDF
ChaoSlingr: Introducing Security-Based Chaos Testing
PDF
Collaborative security : Securing open source software
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
PPTX
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
PPTX
Integrate Security into DevOps - SecDevOps
PDF
DevSecOps - Building continuous security into it and app infrastructures
PDF
DevSecOps | DevOps Sec
PDF
Secure Coding for Java - An Introduction
Mobile Security at OWASP - MASVS and MSTG
Stephen Sadowski - Securely automating infrastructure in the cloud
Application Security Logging with Splunk using Java
Beyond the mcse red teaming active directory
Dev secops on the offense automating amazon web services account takeover
Security in CI/CD Pipelines: Tips for DevOps Engineers
SecDevOps 2.0 - Managing Your Robot Army
Dev seccon london 2016 intelliment security
The Dev, Sec and Ops of API Security - API World
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Red Team vs. Blue Team on AWS
Top API Security Issues Found During POCs
ChaoSlingr: Introducing Security-Based Chaos Testing
Collaborative security : Securing open source software
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Integrate Security into DevOps - SecDevOps
DevSecOps - Building continuous security into it and app infrastructures
DevSecOps | DevOps Sec
Secure Coding for Java - An Introduction
Ad

Similar to [OPD 2019] Governance as a missing part of IT security architecture (20)

PPTX
DevSecCon Tel Aviv 2018 - Security learns to sprint by Tanya Janca
PDF
[OPD 2019] Advanced Data Analysis in RegSOC
PPTX
HouSecCon 2019: Offensive Security - Starting from Scratch
PDF
Owasp summit debrief v1.0 (jun 2017)
PDF
DevSecOps: A New Hope for Security in CI/CD
PDF
Running an app sec program with OWASP projects_ Defcon AppSec Village
PDF
Shift Left Security
PPT
Web Application Security Testing
PDF
Shift Left Security
PDF
DevSecOps at Agile 2019
PPTX
Дмитро Терещенко, "How to secure your application with Secure SDLC"
PDF
What Every Developer And Tester Should Know About Software Security
PDF
AppSec in an Agile World
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PPT
OWASP - Building Secure Web Applications
PPT
3830100.ppt
PPTX
Speed with Confidence
PPTX
Speed with confidence
PDF
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
PDF
Security of the future - Adapting Approaches to What We Need
DevSecCon Tel Aviv 2018 - Security learns to sprint by Tanya Janca
[OPD 2019] Advanced Data Analysis in RegSOC
HouSecCon 2019: Offensive Security - Starting from Scratch
Owasp summit debrief v1.0 (jun 2017)
DevSecOps: A New Hope for Security in CI/CD
Running an app sec program with OWASP projects_ Defcon AppSec Village
Shift Left Security
Web Application Security Testing
Shift Left Security
DevSecOps at Agile 2019
Дмитро Терещенко, "How to secure your application with Secure SDLC"
What Every Developer And Tester Should Know About Software Security
AppSec in an Agile World
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
OWASP - Building Secure Web Applications
3830100.ppt
Speed with Confidence
Speed with confidence
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Security of the future - Adapting Approaches to What We Need
Ad

More from OWASP (20)

PDF
[OPD 2019] Web Apps vs Blockchain dApps
PDF
[OPD 2019] Threat modeling at scale
PDF
[OPD 2019] .NET Core Security
PDF
[OPD 2019] Top 10 Security Facts of 2020
PDF
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PPTX
[OPD 2019] Inter-application vulnerabilities
PDF
[OPD 2019] Automated Defense with Serverless computing
PDF
[OPD 2019] Attacking JWT tokens
PDF
[OPD 2019] Rumpkernels meet fuzzing
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
[Wroclaw #9] The purge - dealing with secrets in Opera Software
PDF
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
PDF
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
PDF
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
PDF
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
PPTX
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
PPTX
OWASP Poland Day 2018 - Omer Levi Hevroni - Secure the Pipeline
[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Threat modeling at scale
[OPD 2019] .NET Core Security
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Attacking JWT tokens
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Trusted types and the end of DOM XSS
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP Poland Day 2018 - Dani Ramirez - IPMI hacking
OWASP Poland Day 2018 - Pedro Fortuna - Are your Java Script based protection...
OWASP Poland Day 2018 - Omer Levi Hevroni - Secure the Pipeline

Recently uploaded (20)

DOCX
Unit-3 cyber security network security of internet system
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Funds Management Learning Material for Beg
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Unit-3 cyber security network security of internet system
Job_Card_System_Styled_lorem_ipsum_.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
international classification of diseases ICD-10 review PPT.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
Introuction about WHO-FIC in ICD-10.pptx
presentation_pfe-universite-molay-seltan.pptx
Paper PDF World Game (s) Great Redesign.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
Module 1 - Cyber Law and Ethics 101.pptx
tcp ip networks nd ip layering assotred slides
An introduction to the IFRS (ISSB) Stndards.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Triggering QUIC, presented by Geoff Huston at IETF 123
introduction about ICD -10 & ICD-11 ppt.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Funds Management Learning Material for Beg
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx

[OPD 2019] Governance as a missing part of IT security architecture

  • 1. GOVERNANCE AS A MISSING PART OF IT SECURITY ARCHITECTURE
  • 2. WELL DESIGNED SECURITY ARCHITECTURE OWASP DAY POLAND 2 Technology: Tooling Processes: How we do Organization: People (culture) SECURITY CI/CD Technology Organization Processes
  • 3. Source: Gartner 2017Sourve: Gartner 2017 HOW IT WORKS BY GARTNER OWASP DAY POLAND 3 DEV/OPS 2.0DEV/OPS 2.0
  • 4. HOW IT WORKS SO FAR OWASP DAY POLAND 4
  • 5. HUMAN ERROR Human error means that something has been done that was "not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits". In short, it is a deviation from intention, expectation or desirability. OWASP DAY POLAND 5
  • 6. SO, THE QUESTION IS: OWASP DAY POLAND 6 ??
  • 7. Process A series of actions or steps taken in order to achieve a particular end Process is not a bureaucracy Automation Process automation refers to the use of digital technology to perform a process or processes in order to accomplish a workflow or function. OWASP DAY POLAND 7 GOVERNANCE
  • 8. CAPABILITY MATURITY MODEL (CMM) OWASP DAY POLAND 8
  • 9. OWASP DAY POLAND 9 Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Design ● Threat modeling ● Secure design Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Test ● Vulnerability Assessment ● Dynamic Analysis ● Functional tests ● QA Develop ● Code review ● Unit testing ● Static Analysis Define ● Code Standards ● Security Non Functional Requirements (SNFR) Training ● Secure Coding Practices ● Writing security tests ● Provider/Platform Technical Training SECURE DESIGN/DEVELOPMENT OPS KPI
  • 10. OWASP DAY POLAND 10 Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Design ● Threat modeling ● Secure design Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Test ● Vulnerability Assessment ● Dynamic Analysis ● Functional tests ● QA Develop ● Code review ● Unit testing ● Static Analysis Define ● Code Standards ● Security Non Functional Requirements (SNFR) Training ● Secure Coding Practices ● Writing security tests ● Provider/Platform Technical Training SECURE DESIGN/DEVELOPMENT OPS KPI
  • 11. OWASP DAY POLAND 11 Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Design ● Threat modeling ● Secure design Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Training • Secure Coding Practices • Writing security tests • Provider/Platform Technical Training Test ● Vulnerability Assessment ● Dynamic Analysis ● Functional tests ● QA Develop ● Code review ● Unit testing ● Static Analysis ● Dynamic Analysis Define ● Code Standards ● Security Non Functional Requirements (SNFR) Training ● Secure Coding Practices ● Writing security tests ● Provider/Platform Technical Training SECURE DESIGN/DEVELOPMENT OPS KPI KPIKPI KPI KPIKPIKPI KPI
  • 12. Source: Gartner 2017Sourve: Gartner 2017 HOW IT CAN WORK OWASP DAY POLAND 12 DEV/OPS 2.0DEV/OPS 2.0