SlideShare a Scribd company logo
© 2019 Synopsys, Inc.1
Building a Culture of Secure Programming
in Your Organization
Amanvir Sangha
Synopsys Software Integrity Group—2019
© 2019 Synopsys, Inc.2
Introduction
Software security engineer consultant, Synopsys
• Static analysis, code review
• Training
• Penetration testing
Experience:
Software Security Engineer (FinTech)
• Bug bounty/vulnerability disclosure programs
• Building AppSec from the ground up
Software Engineer (FinTech)
• Building life insurance software
• Focus on quality and high assurance: TDD, BDD
Startup (Security)
• Building a SaaS platform for vulnerability scanning
amanvir@synopsys.com
@_amanvir
© 2019 Synopsys, Inc.4
Agenda
• Why culture?
• Modern software engineering
- Challenges in modern software engineering
- Dealing with constant change
• Solutions to new challenges
• Allowing security to be an enabler
- Maintaining velocity
• Nurturing a culture of proactive security
- Automation
- Tooling
- Environment
© 2019 Synopsys, Inc.6
Why focus on culture?
Culture “can account for 20-30%
of the differential in corporate
performance when compared
with ‘culturally unremarkable’
competitors.” 1
1
https://hbr.org/2013/05/six-components-of-culture
Technologies change, but people stay the same.
© 2019 Synopsys, Inc.7
Rise of polyglot environments
polyglot
/ˈpɒlɪɡlɒt/ adjective
1. knowing or using
several languages.
© 2019 Synopsys, Inc.8
“If a company chooses to write its software
in a comparatively esoteric language,
they'll be able to hire better programmers, because
they'll attract only those who cared enough to learn it.”
—Paul Graham, The Python Paradox, 2004
© 2019 Synopsys, Inc.9
Why polyglot?
• Polyglot developers allow companies to build software faster
• It’s a competitive advantage: if you don’t do it, you don’t survive
• But it brings new challenges:
– How do we deal with this complexity?
– How do we keep up?
© 2019 Synopsys, Inc.11
Polyglot environments
Now
• Microservices!
• Deploying to the cloud
• Several stacks
• Agile/DevOps: Daily, if not
hourly deployment, constant
code changes
• How does security keep up?
In the past
• Monolithic applications
• Typically one or two stacks
• Waterfall methodology
• Infrequent deployments
• Security can “keep up”
© 2019 Synopsys, Inc.13
Observation: teams in 2019
Operations
• DevOps: AWS, Kubernetes,
Terraform, Ansible
• Everything written as code
Quality
• Automated: TDD, BDD, automated
testing in CI/CD pipelines
• Everything written as code
Security Development
• Multiple languages, multiple platforms,
multiple architectures
• Everything written as code
• Tools and process oriented
• Not moving as fast
• Working silo
© 2019 Synopsys, Inc.14
Polyglot environments = new challenges
• Environment are now much more complex
• Faster rate of change
Key questions
Does your security team understand the technologies the developer teams are using?
Are they familiar with the languages use? Can they code in them?
Are they moving at the same pace as the development teams?
© 2019 Synopsys, Inc.15
Security vs. developers' skill sets
Security
Architecture Risk Analysis, Threat
Modeling, Penetration Testing, Static
Security Analysis
Burp Suite, nmap, Metasploit
Maybe can write scripts
Developers
Test Driven Development, Behaviour
Driven-Design, User Experience, User
Interface
Code Editors, Compilers, Browsers
Write code daily, can build production
applications and deploy them
© 2019 Synopsys, Inc.16
Internal security vs. developer pressures
Risk Reduction
Are there
security bugs?
Is it resilient?
Security Static
Analysis
Coverage
Remediating
Code
Feature Velocity
Are there
functional bugs?
Is it scalable?
Code Release
Deadlines
Unit Testing
Coverage
Refactoring
Code
© 2019 Synopsys, Inc.17
Align parallel pressures
Risk Reduction
Are there
security bugs?
Is it resilient?
Security Static
Analysis
Coverage
Remediating
Code
Feature Velocity
Are there
functional bugs?
Is it scalable?
Code Release
Deadlines
Unit Testing
Coverage
Refactoring
Code
Culture:
Communication
© 2019 Synopsys, Inc.18
Align parallel pressures
Risk Reduction
Are there
security bugs?
Is it resilient?
Security Static
Analysis
Coverage
Remediating
Code
Feature Velocity
Are there
functional bugs?
Is it scalable?
Code Release
Deadlines
Unit Testing
Coverage
Refactoring
Code
Culture:
Communication
Culture: Security
Training
© 2019 Synopsys, Inc.19
Align parallel pressures
Risk Reduction
Are there
security bugs?
Is it resilient?
Security Static
Analysis
Coverage
Remediating
Code
Feature Velocity
Are there
functional bugs?
Is it scalable?
Code Release
Deadlines
Unit Testing
Coverage
Refactoring
Code
Culture:
Communication
Culture: Security
Training
Culture: Security
Testing
© 2019 Synopsys, Inc.20
Align parallel pressures
Risk Reduction
Are there
security bugs?
Is it resilient?
Security Static
Analysis
Coverage
Remediating
Code
Feature Velocity
Are there
functional bugs?
Is it scalable?
Code Release
Deadlines
Unit Testing
Coverage
Refactoring
Code
Culture:
Communication
Culture: Security
Training
Culture: Security
Testing
Culture:
Automation
© 2019 Synopsys, Inc.21
Align parallel pressures
Risk Reduction
Are there
security bugs?
Is it resilient?
Security Static
Analysis
Coverage
Remediating
Code
Feature Velocity
Are there
functional bugs?
Is it scalable?
Code Release
Deadlines
Unit Testing
Coverage
Refactoring
Code
Culture:
Communication
Culture: Security
Training
Culture: Security
Testing
Culture: Pair
Programming,
User Stories
Culture:
Automation
© 2019 Synopsys, Inc.22
So what does a Good Culturetm look like?
• Open Communication, Interacting with the development teams
– Security Champions
• Security Training
– CTFs, Conferences
• Testing
– Continuous Testing
– Via automation, tools, CI/CD pipelines
– Manual Review
– For the high priority issues
• Automation
– Code analysis, pipelines, chatops
• General Culture
– Pair programming, sharing knowledge, security-centric user stories, transparency
© 2019 Synopsys, Inc.23
Automation increases velocity and
decreases bureaucracy, allowing
companies to move faster.
© 2019 Synopsys, Inc.24
Individuals and interactions over processes and tools
• Assumption: We will do a penetration test and find issues with the application
• Reality: How do we deal with the results? Are the developer aware of how to fix these
findings? How do we prevent these mistakes from happening again in the future? Are we
seeing the same vulnerabilities again year over year?
“Make it easy to
do the right thing”
Automation
Make your stack
secure by default
© 2019 Synopsys, Inc.25
If you’re not speaking the language
of development,
and you’re not using tools and processes
that align with the developers’ world,
you’re not doing software security.
—Nick Murison, Head of Software Security Services, Nordics, Synopsys
© 2019 Synopsys, Inc.26
Security champions
• Primarily located in areas outside SSG
(e.g. technology/development teams)
• Do not directly report to SSG but are key
players in evangelizing security activities
and culture
• Primary responsibilities:
– Assist in triage for the engineering team
they belong to
– Involved in security decisions with their
engineering team
– Developing code and writing tests relevant
to security
– Involved in automation in pipelines
© 2019 Synopsys, Inc.27
Communication and engagement
• Early involvement in SDLC leads to lower costs and less security bugs
– But! Communication and engagement are necessary for this.
Key questions:
– Are you aware of new products being built in your organization?
– Are you aware of new features that are being implemented?
– Are you involved when user stories are written?
– Are you involved at the design stage for architecture?
• How do we communicate and engage?
– Security Champions!
© 2019 Synopsys, Inc.28
Find your security champions
Security DevelopersSweet spot:
the developers who can do
application security, e.g. pair
program with teams, implement
security user stories
© 2019 Synopsys, Inc.31
Nurture your security champions
Should we do
another CTF next year? • Sparking curiosity in security
– If you are not involving your development teams in security,
you will not be able to do this
• Stay involved with them
– Via slack or messaging applications
– Weekly meetings
• Case Study: DropBox “Trustober”
– 30 events centred around security and training
– CTFs for developers
– Training for staff in security
https://blogs.dropbox.com/tech/2018/06/securit
y-culture-the-dropbox-way/
100%
YES
© 2019 Synopsys, Inc.32
Nurture your culture
• Security is everyone’s responsibility, collaboration is key
– Get every team involved: Operations, Network, Quality, Business and Development
• Get involved early
• Proactive not reactive
• Don’t work in silo, share what you work on
• Internal evangelism via security champions
• Be empathetic when working with security issues and development teams
– This is especially true with working on remediating issues or disclosing vulnerabilities
© 2019 Synopsys, Inc.33
Strategy &
Planning
Maturity Action Plan (MAP)
Building Security in Maturity
Model (BSIMM)
Dynamic
Application
Security Testing
Managed
Services
Static
Application
Security Testing
Penetration
Testing
Mobile
Application
Security Testing
Professional
Services
Industry
Solutions
Architecture
and Design
Security
Training
DevSecOps
Integration
Cloud
Security
Synopsys Software Security and Quality
Portfolio
Integrated
Tools
Seeker & Defensics
Dynamic Analysis
Coverity
Static Analysis
Black Duck
Software Composition
Analysis
=Available on the Polaris platform
© 2019 Synopsys, Inc.34
Build Secure, High-Quality Software Faster
Thank You
© 2019 Synopsys, Inc.36

More Related Content

PDF
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
PDF
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
PDF
An Updated Take: Threat Modeling for IoT Systems
PDF
Vulnerability Management In An Application Security World: AppSecDC
PDF
Webinar–The State of Open Source in M&A Transactions
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
Top Strategies to Capture Security Intelligence for Applications
PPTX
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
Do Design Quality and Code Quality Matter in Merger and Acquisition Tech Due ...
Webinar–Improving Fuzz Testing of Infotainment Systems and Telematics Units U...
An Updated Take: Threat Modeling for IoT Systems
Vulnerability Management In An Application Security World: AppSecDC
Webinar–The State of Open Source in M&A Transactions
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Top Strategies to Capture Security Intelligence for Applications
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps

What's hot (20)

PDF
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
PDF
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
PPTX
Automate and Enhance Application Security Analysis
PPTX
How to build app sec team & culture in your organization the hack summi...
PPTX
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
PDF
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
PDF
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
PDF
Digital Security by Design Vision
 
PPTX
Accelerate Your Digital Transformation Journey with Cloud Native and Low-Cod...
PDF
Threat Modelling in DevSecOps Cultures
PDF
Real Cost of Software Remediation
PDF
Securing DevOps Lifecycle
PPTX
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
PDF
Use our OWASP Threat Modeling Playbook to Improve your Product Security
PDF
SG MVPA Workshop Booklet Fall 2015
PPTX
Mendix essentials 25 11-2011 introductie mendix by arno rood
PDF
2015 HPSR Cyber Risk Report
PDF
Shift Left Security: Development Does Not Want to Own It.
PDF
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
PDF
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
DevSecCon Singapore 2019: Four years of reflection: How (not) to secure Web A...
Automate and Enhance Application Security Analysis
How to build app sec team & culture in your organization the hack summi...
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
DevSecCon Singapore 2019: The journey of digital transformation through DevSe...
Digital Security by Design Vision
 
Accelerate Your Digital Transformation Journey with Cloud Native and Low-Cod...
Threat Modelling in DevSecOps Cultures
Real Cost of Software Remediation
Securing DevOps Lifecycle
Agile Gurugram Conference 2020 | Keeping software secure in agile | Gurpreet ...
Use our OWASP Threat Modeling Playbook to Improve your Product Security
SG MVPA Workshop Booklet Fall 2015
Mendix essentials 25 11-2011 introductie mendix by arno rood
2015 HPSR Cyber Risk Report
Shift Left Security: Development Does Not Want to Own It.
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
Ad

Similar to Webinar–Building A Culture of Secure Programming in Your Organization (20)

PDF
Webinar – Software Security 2019–Embrace Velocity
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
Webinar–AppSec: Hype or Reality
PDF
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
PDF
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
PPTX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
PDF
Webinar–That is Not How This Works
PPTX
Synopsys_site.pptx
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
PPTX
2024 Most Influenced Software Development Technologies_ A Detailed Recap.pptx
PDF
A Successful SAST Tool Implementation
PDF
Webinar–Best Practices for DevSecOps at Scale
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
Webinar – Risk-based adaptive DevSecOps
PPTX
Automate and Enhance Application Security Analysis
PDF
SDM: The Fundamentals of Software Delivery Management
PDF
APIdays Singapore 2019 - Maturity model for Microservices: Untangling a Big B...
Webinar – Software Security 2019–Embrace Velocity
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Bridging the Security Testing Gap in Your CI/CD Pipeline
Webinar–AppSec: Hype or Reality
Webinar – Streamling Your Tech Due Diligence Process for Software Assets
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Webinar–That is Not How This Works
Synopsys_site.pptx
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
2024 Most Influenced Software Development Technologies_ A Detailed Recap.pptx
A Successful SAST Tool Implementation
Webinar–Best Practices for DevSecOps at Scale
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Webinar – Risk-based adaptive DevSecOps
Automate and Enhance Application Security Analysis
SDM: The Fundamentals of Software Delivery Management
APIdays Singapore 2019 - Maturity model for Microservices: Untangling a Big B...
Ad

More from Synopsys Software Integrity Group (20)

PDF
Webinar–Segen oder Fluch?
PDF
Webinar–Mobile Application Hardening Protecting Business Critical Apps
PDF
Webinar–The 2019 Open Source Year in Review
PDF
Webinar–You've Got Your Open Source Audit Report–Now What?
PDF
Webinar–OWASP Top 10 for JavaScript for Developers
PDF
Webinar–5 ways to risk rank your vulnerabilities
PDF
Webinar–Using Evidence-Based Security
PDF
Webinar–Delivering a Next Generation Vulnerability Feed
PDF
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
PDF
Webinar–What You Need To Know About Open Source Licensing
PDF
Webinar–Why All Open Source Scans Aren't Created Equal
PDF
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
PDF
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
PDF
Webinar – Security Tool Misconfiguration and Abuse
PDF
Webinar - Developers Are Your Greatest AppSec Resource
PDF
Webinar – Using Metrics to Drive Your Software Security Initiative
PDF
Webinar–Vulnerabilities in Containerised Production Environments
PDF
Infographic–A Look Back at the First Year of GDPR
PDF
Webinar–2019 Open Source Risk Analysis Report
PDF
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Segen oder Fluch?
Webinar–Mobile Application Hardening Protecting Business Critical Apps
Webinar–The 2019 Open Source Year in Review
Webinar–You've Got Your Open Source Audit Report–Now What?
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–5 ways to risk rank your vulnerabilities
Webinar–Using Evidence-Based Security
Webinar–Delivering a Next Generation Vulnerability Feed
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–What You Need To Know About Open Source Licensing
Webinar–Why All Open Source Scans Aren't Created Equal
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Sécurité Applicative et DevSecOps dans un monde Agile
Webinar – Security Tool Misconfiguration and Abuse
Webinar - Developers Are Your Greatest AppSec Resource
Webinar – Using Metrics to Drive Your Software Security Initiative
Webinar–Vulnerabilities in Containerised Production Environments
Infographic–A Look Back at the First Year of GDPR
Webinar–2019 Open Source Risk Analysis Report
Webinar–Open Source Risk in M&A by the Numbers

Recently uploaded (20)

PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
top salesforce developer skills in 2025.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Transform Your Business with a Software ERP System
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Nekopoi APK 2025 free lastest update
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
history of c programming in notes for students .pptx
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
top salesforce developer skills in 2025.pdf
Reimagine Home Health with the Power of Agentic AI​
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Operating system designcfffgfgggggggvggggggggg
Transform Your Business with a Software ERP System
CHAPTER 2 - PM Management and IT Context
PTS Company Brochure 2025 (1).pdf.......
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Odoo POS Development Services by CandidRoot Solutions
Nekopoi APK 2025 free lastest update
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
history of c programming in notes for students .pptx
VVF-Customer-Presentation2025-Ver1.9.pptx
Understanding Forklifts - TECH EHS Solution
2025 Textile ERP Trends: SAP, Odoo & Oracle
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Odoo Companies in India – Driving Business Transformation.pdf

Webinar–Building A Culture of Secure Programming in Your Organization

  • 1. © 2019 Synopsys, Inc.1 Building a Culture of Secure Programming in Your Organization Amanvir Sangha Synopsys Software Integrity Group—2019
  • 2. © 2019 Synopsys, Inc.2 Introduction Software security engineer consultant, Synopsys • Static analysis, code review • Training • Penetration testing Experience: Software Security Engineer (FinTech) • Bug bounty/vulnerability disclosure programs • Building AppSec from the ground up Software Engineer (FinTech) • Building life insurance software • Focus on quality and high assurance: TDD, BDD Startup (Security) • Building a SaaS platform for vulnerability scanning amanvir@synopsys.com @_amanvir
  • 3. © 2019 Synopsys, Inc.4 Agenda • Why culture? • Modern software engineering - Challenges in modern software engineering - Dealing with constant change • Solutions to new challenges • Allowing security to be an enabler - Maintaining velocity • Nurturing a culture of proactive security - Automation - Tooling - Environment
  • 4. © 2019 Synopsys, Inc.6 Why focus on culture? Culture “can account for 20-30% of the differential in corporate performance when compared with ‘culturally unremarkable’ competitors.” 1 1 https://hbr.org/2013/05/six-components-of-culture Technologies change, but people stay the same.
  • 5. © 2019 Synopsys, Inc.7 Rise of polyglot environments polyglot /ˈpɒlɪɡlɒt/ adjective 1. knowing or using several languages.
  • 6. © 2019 Synopsys, Inc.8 “If a company chooses to write its software in a comparatively esoteric language, they'll be able to hire better programmers, because they'll attract only those who cared enough to learn it.” —Paul Graham, The Python Paradox, 2004
  • 7. © 2019 Synopsys, Inc.9 Why polyglot? • Polyglot developers allow companies to build software faster • It’s a competitive advantage: if you don’t do it, you don’t survive • But it brings new challenges: – How do we deal with this complexity? – How do we keep up?
  • 8. © 2019 Synopsys, Inc.11 Polyglot environments Now • Microservices! • Deploying to the cloud • Several stacks • Agile/DevOps: Daily, if not hourly deployment, constant code changes • How does security keep up? In the past • Monolithic applications • Typically one or two stacks • Waterfall methodology • Infrequent deployments • Security can “keep up”
  • 9. © 2019 Synopsys, Inc.13 Observation: teams in 2019 Operations • DevOps: AWS, Kubernetes, Terraform, Ansible • Everything written as code Quality • Automated: TDD, BDD, automated testing in CI/CD pipelines • Everything written as code Security Development • Multiple languages, multiple platforms, multiple architectures • Everything written as code • Tools and process oriented • Not moving as fast • Working silo
  • 10. © 2019 Synopsys, Inc.14 Polyglot environments = new challenges • Environment are now much more complex • Faster rate of change Key questions Does your security team understand the technologies the developer teams are using? Are they familiar with the languages use? Can they code in them? Are they moving at the same pace as the development teams?
  • 11. © 2019 Synopsys, Inc.15 Security vs. developers' skill sets Security Architecture Risk Analysis, Threat Modeling, Penetration Testing, Static Security Analysis Burp Suite, nmap, Metasploit Maybe can write scripts Developers Test Driven Development, Behaviour Driven-Design, User Experience, User Interface Code Editors, Compilers, Browsers Write code daily, can build production applications and deploy them
  • 12. © 2019 Synopsys, Inc.16 Internal security vs. developer pressures Risk Reduction Are there security bugs? Is it resilient? Security Static Analysis Coverage Remediating Code Feature Velocity Are there functional bugs? Is it scalable? Code Release Deadlines Unit Testing Coverage Refactoring Code
  • 13. © 2019 Synopsys, Inc.17 Align parallel pressures Risk Reduction Are there security bugs? Is it resilient? Security Static Analysis Coverage Remediating Code Feature Velocity Are there functional bugs? Is it scalable? Code Release Deadlines Unit Testing Coverage Refactoring Code Culture: Communication
  • 14. © 2019 Synopsys, Inc.18 Align parallel pressures Risk Reduction Are there security bugs? Is it resilient? Security Static Analysis Coverage Remediating Code Feature Velocity Are there functional bugs? Is it scalable? Code Release Deadlines Unit Testing Coverage Refactoring Code Culture: Communication Culture: Security Training
  • 15. © 2019 Synopsys, Inc.19 Align parallel pressures Risk Reduction Are there security bugs? Is it resilient? Security Static Analysis Coverage Remediating Code Feature Velocity Are there functional bugs? Is it scalable? Code Release Deadlines Unit Testing Coverage Refactoring Code Culture: Communication Culture: Security Training Culture: Security Testing
  • 16. © 2019 Synopsys, Inc.20 Align parallel pressures Risk Reduction Are there security bugs? Is it resilient? Security Static Analysis Coverage Remediating Code Feature Velocity Are there functional bugs? Is it scalable? Code Release Deadlines Unit Testing Coverage Refactoring Code Culture: Communication Culture: Security Training Culture: Security Testing Culture: Automation
  • 17. © 2019 Synopsys, Inc.21 Align parallel pressures Risk Reduction Are there security bugs? Is it resilient? Security Static Analysis Coverage Remediating Code Feature Velocity Are there functional bugs? Is it scalable? Code Release Deadlines Unit Testing Coverage Refactoring Code Culture: Communication Culture: Security Training Culture: Security Testing Culture: Pair Programming, User Stories Culture: Automation
  • 18. © 2019 Synopsys, Inc.22 So what does a Good Culturetm look like? • Open Communication, Interacting with the development teams – Security Champions • Security Training – CTFs, Conferences • Testing – Continuous Testing – Via automation, tools, CI/CD pipelines – Manual Review – For the high priority issues • Automation – Code analysis, pipelines, chatops • General Culture – Pair programming, sharing knowledge, security-centric user stories, transparency
  • 19. © 2019 Synopsys, Inc.23 Automation increases velocity and decreases bureaucracy, allowing companies to move faster.
  • 20. © 2019 Synopsys, Inc.24 Individuals and interactions over processes and tools • Assumption: We will do a penetration test and find issues with the application • Reality: How do we deal with the results? Are the developer aware of how to fix these findings? How do we prevent these mistakes from happening again in the future? Are we seeing the same vulnerabilities again year over year? “Make it easy to do the right thing” Automation Make your stack secure by default
  • 21. © 2019 Synopsys, Inc.25 If you’re not speaking the language of development, and you’re not using tools and processes that align with the developers’ world, you’re not doing software security. —Nick Murison, Head of Software Security Services, Nordics, Synopsys
  • 22. © 2019 Synopsys, Inc.26 Security champions • Primarily located in areas outside SSG (e.g. technology/development teams) • Do not directly report to SSG but are key players in evangelizing security activities and culture • Primary responsibilities: – Assist in triage for the engineering team they belong to – Involved in security decisions with their engineering team – Developing code and writing tests relevant to security – Involved in automation in pipelines
  • 23. © 2019 Synopsys, Inc.27 Communication and engagement • Early involvement in SDLC leads to lower costs and less security bugs – But! Communication and engagement are necessary for this. Key questions: – Are you aware of new products being built in your organization? – Are you aware of new features that are being implemented? – Are you involved when user stories are written? – Are you involved at the design stage for architecture? • How do we communicate and engage? – Security Champions!
  • 24. © 2019 Synopsys, Inc.28 Find your security champions Security DevelopersSweet spot: the developers who can do application security, e.g. pair program with teams, implement security user stories
  • 25. © 2019 Synopsys, Inc.31 Nurture your security champions Should we do another CTF next year? • Sparking curiosity in security – If you are not involving your development teams in security, you will not be able to do this • Stay involved with them – Via slack or messaging applications – Weekly meetings • Case Study: DropBox “Trustober” – 30 events centred around security and training – CTFs for developers – Training for staff in security https://blogs.dropbox.com/tech/2018/06/securit y-culture-the-dropbox-way/ 100% YES
  • 26. © 2019 Synopsys, Inc.32 Nurture your culture • Security is everyone’s responsibility, collaboration is key – Get every team involved: Operations, Network, Quality, Business and Development • Get involved early • Proactive not reactive • Don’t work in silo, share what you work on • Internal evangelism via security champions • Be empathetic when working with security issues and development teams – This is especially true with working on remediating issues or disclosing vulnerabilities
  • 27. © 2019 Synopsys, Inc.33 Strategy & Planning Maturity Action Plan (MAP) Building Security in Maturity Model (BSIMM) Dynamic Application Security Testing Managed Services Static Application Security Testing Penetration Testing Mobile Application Security Testing Professional Services Industry Solutions Architecture and Design Security Training DevSecOps Integration Cloud Security Synopsys Software Security and Quality Portfolio Integrated Tools Seeker & Defensics Dynamic Analysis Coverity Static Analysis Black Duck Software Composition Analysis =Available on the Polaris platform
  • 28. © 2019 Synopsys, Inc.34 Build Secure, High-Quality Software Faster