SlideShare a Scribd company logo
Security Toolbox: Managing Security Risk for Agile Practitioners Matthew Coles & Izar Tarandach RSA, the Security Division of EMC
Challenges in Agile Agile Development simulated by a classic arcade game
Defects (”holes”) occur for many reasons Flood of requirements
No visibility
No resources
Challenges in Agile Goal to successfully implement slices of requirements, adapting to changes as they come from the customer Function over Form
Success criteria defined by Product Owner (channelling the customer)
Acceptance tests and design requirements only as good as team Reliance on subject matter expertise; not always dedicated to the effort
Traditional Techniques Security for Software Development Lifecycle Risk Analysis
Code Analysis
Security Testing
Security Documentation Only Risk Analysis can help avoid security risk Before ”security debt” exists
But can still be too late to avoid costly rework
Security Debt Technical Debt Measure of rework that will be required to address built-in flaws Security Debt Technical Debt which leads to security vulnerabilities
Our Vision Give Product Owners and Agile teams a method to prevent injecting security defects Predict backlog items, acceptance tests, and documentation as architecture is defined
Enable better work estimation
Identify and manage technical debt Give security SMEs a helping hand or give small organizations the benefit of an SME if they don't have one Minimize Security Debt
Security Toolbox ”Playbook” for security Collection of security knowledge
Each item associated to architectural feature Built-in Security Functional elements for security improvement
Acceptance tests to implement
Policy compliance updates
Resource cost estimates
Priority Hints to Product Owners and Scrum Masters
Constructing the Toolbox Requires security knowledge (of course)

More Related Content

PPTX
Unlocking security insights with Microsoft Graph API
PPTX
Hack through Injections
PPTX
Application Security 101 (OWASP DC)
PPTX
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
PDF
Secure Coding for Java - An Introduction
PPTX
For Business's Sake, Let's focus on AppSec
PPTX
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
PPTX
java2days 2014: Attacking JavaEE Application Servers
Unlocking security insights with Microsoft Graph API
Hack through Injections
Application Security 101 (OWASP DC)
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Secure Coding for Java - An Introduction
For Business's Sake, Let's focus on AppSec
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
java2days 2014: Attacking JavaEE Application Servers

What's hot (20)

PPT
2.Public Vulnerability Databases
PPTX
Agile and Secure SDLC
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
PPTX
PDF
OWASP Secure Coding Practices - Quick Reference Guide
PPTX
Cloud Security vs Security in the Cloud
PDF
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
PDF
Are Agile And Secure Development Mutually Exclusive?
PPTX
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
PPTX
Secure Software Development Lifecycle
 
PDF
Op2423922398
PDF
5 Important Secure Coding Practices
PDF
"CERT Secure Coding Standards" by Dr. Mark Sherman
PPT
IBM Rational AppScan Product Overview
PPTX
Building better product security
PPTX
Security hole #5 application security science or quality assurance
PPTX
What’s making way for secure sdlc
PPTX
Intro to Security in SDLC
PPTX
Penetration testing dont just leave it to chance
2.Public Vulnerability Databases
Agile and Secure SDLC
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Choose'10: Uwe Zdun - Compliance in service-oriented architectures: A model-d...
OWASP Secure Coding Practices - Quick Reference Guide
Cloud Security vs Security in the Cloud
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Are Agile And Secure Development Mutually Exclusive?
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Secure Software Development Lifecycle
 
Op2423922398
5 Important Secure Coding Practices
"CERT Secure Coding Standards" by Dr. Mark Sherman
IBM Rational AppScan Product Overview
Building better product security
Security hole #5 application security science or quality assurance
What’s making way for secure sdlc
Intro to Security in SDLC
Penetration testing dont just leave it to chance
Ad

Viewers also liked (7)

PDF
James Beeson SOURCE Boston 2011
PDF
Who should the security team hire next?
PDF
Jeremy Allen - Rajendra Umadas - Network Stream Hacking With Mallory
PPTX
Dan Crowley - Jack Of All Formats
PDF
David Snead - Nailing Down Security Regulations
PDF
Paul Asadoorian - Bringing Sexy Back
PDF
Wim Remes SOURCE Boston 2011
James Beeson SOURCE Boston 2011
Who should the security team hire next?
Jeremy Allen - Rajendra Umadas - Network Stream Hacking With Mallory
Dan Crowley - Jack Of All Formats
David Snead - Nailing Down Security Regulations
Paul Asadoorian - Bringing Sexy Back
Wim Remes SOURCE Boston 2011
Ad

Similar to Matthew Coles - Izar Tarandach - Security Toolbox (20)

PDF
Agile Secure Development
PPT
Software Security Engineering
PDF
Ibm עמרי וייסמן
PDF
Omri
PDF
Ibm עמרי וייסמן
PPTX
Started In Security Now I'm Here
PPT
Software Security in the Real World
PPTX
Hacker vs Tools: Which to Choose?
PPTX
Hacker vs tools
PDF
AppSec in an Agile World
PDF
Owasp tds
PPT
Intro to-ssdl--lone-star-php-2013
PDF
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
PPTX
Secure coding - Balgan - Tiago Henriques
PPT
Secure SDLC for Software
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PDF
ProdSec: A Technical Approach
PPT
Web Application Security Testing
PPTX
Enumerating software security design flaws throughout the ssdlc cosac - 201...
PPTX
Enumerating software security design flaws throughout the SSDLC
Agile Secure Development
Software Security Engineering
Ibm עמרי וייסמן
Omri
Ibm עמרי וייסמן
Started In Security Now I'm Here
Software Security in the Real World
Hacker vs Tools: Which to Choose?
Hacker vs tools
AppSec in an Agile World
Owasp tds
Intro to-ssdl--lone-star-php-2013
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
Secure coding - Balgan - Tiago Henriques
Secure SDLC for Software
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
ProdSec: A Technical Approach
Web Application Security Testing
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the SSDLC

More from Source Conference (20)

PPTX
Million Browser Botnet
PDF
iBanking - a botnet on Android
PPTX
I want the next generation web here SPDY QUIC
PPTX
From DNA Sequence Variation to .NET Bits and Bobs
PPTX
Extracting Forensic Information From Zeus Derivatives
PPTX
How to Like Social Media Network Security
PDF
Wfuzz para Penetration Testers
PDF
Security Goodness with Ruby on Rails
PDF
Securty Testing For RESTful Applications
PPSX
Esteganografia
PPTX
Men in the Server Meet the Man in the Browser
PDF
Advanced Data Exfiltration The Way Q Would Have Done It
PPTX
Adapting To The Age Of Anonymous
PDF
Advanced (persistent) binary planting
PPTX
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
PDF
The Latest Developments in Computer Crime Law
PDF
JSF Security
PPTX
How To: Find The Right Amount Of Security Spend
PPTX
Everything you should already know about MS-SQL post-exploitation
PPTX
Million Browser Botnet
iBanking - a botnet on Android
I want the next generation web here SPDY QUIC
From DNA Sequence Variation to .NET Bits and Bobs
Extracting Forensic Information From Zeus Derivatives
How to Like Social Media Network Security
Wfuzz para Penetration Testers
Security Goodness with Ruby on Rails
Securty Testing For RESTful Applications
Esteganografia
Men in the Server Meet the Man in the Browser
Advanced Data Exfiltration The Way Q Would Have Done It
Adapting To The Age Of Anonymous
Advanced (persistent) binary planting
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
The Latest Developments in Computer Crime Law
JSF Security
How To: Find The Right Amount Of Security Spend
Everything you should already know about MS-SQL post-exploitation

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf

Matthew Coles - Izar Tarandach - Security Toolbox

Editor's Notes

  • #2: Welcome This presentation is presented by Matthew Coles and Izar Tarandach with the EMC Product Security Office. We are presenting a method for identifying and managing security in product development. While our focus today is a result of issues we have observed from teams performing software development in an Agile or iterative lifecycle, this approach may be feasible for more traditional development methods. Ask people why they are at the presentation. Have they done agile before? Are they planning to? Software development team. Scope of work we do at EMC.
  • #3: Security engineering is a puzzle game. We thought Tetris actually provided an excellent way to represent Agile development. Tetris presents a number of matching qualities: * The game starts cleanly, and builds upon previous layers, ad nauseum * Components are added according to some pattern, but that pattern is not known to the player * The player must somehow make all the pieces fit together, and must do this more quickly as time progresses * When (not if) mistakes are made, holes are present in the structure being built. These holes represent security defects. The caveat: in the real world, those holes are not visible, unless certain activities are performed.
  • #4: In an Agile development model, requirements are collected and components fit together, but unlike in standard development lifecycles (i.e waterfall) the order and priority is vaguely random. This is similar to the selection pattern of components in the game from the previous slide. Success criteria is also a moving target, and requires the Product Owner to successfully interpret customer and stakeholder requirements. Finally, acceptance tests, functional design, and other metrics are only as good as the subject matter experts knowledge. Given the often shortened timeframe between requirement generation and functional product, there is limited time to review possible options to select the most secure option.
  • #5: There are of course ways to detect security defects. Risk Analysis – EMC uses a variant of Threat Modeling based on a ”library” tying architecture to threats.
  • #6: As more features are added, security debt (and therefore risk) increases, without mitigations. When mitigations happen (fixing threats and bugs, not testing or threat modeling), there is a momentary drop in debt/risk. Until security detection activities like Threat Modeling or Code Analysis is performed, debt/risk is ”potential” rather than ”kinetic”.
  • #8: Caveat: Toolbox cannot alone fix security defects, only help you avoid them. Just-in-time guidance, without the promise of 100% completeness.
  • #12: .
  • #24: Describe how to select based on architecture, and how to choose between generic or specific.
  • #25: The architecture of the knowledge base upon which the toolbox is created is a great example of the use of the famed expert systems of years gone by. A team looking for help can perform many different queries upon the same fact database: Given a need for a web server, which instance would give me less work to make secure? Given a vulnerability (at any granularity) what instances are NOT vulnerable? Given a set of constraints, what kind of mitigations will I be considering?