Momchil Karov VanSecSIG Best Buy Canada Oct 12, 2018 1 - - PowerPoint PPT Presentation

momchil karov vansecsig best buy canada oct 12 2018 1
SMART_READER_LITE
LIVE PREVIEW

Momchil Karov VanSecSIG Best Buy Canada Oct 12, 2018 1 - - PowerPoint PPT Presentation

HOW TO EMBED SECURITY INTO AGILE? Momchil Karov VanSecSIG Best Buy Canada Oct 12, 2018 1 PRESENTED BY: (A.K.A. THE WHO AM I SLIDE) Momchil Karov, MSc., CISSP Principal Security Architect Enterprise Risk and Compliance Best


slide-1
SLIDE 1

1

HOW TO EMBED SECURITY INTO AGILE?

VanSecSIG Oct 12, 2018 Momchil Karov Best Buy Canada

  

slide-2
SLIDE 2

PRESENTED BY: (A.K.A. THE “WHO AM I” SLIDE)

Momchil Karov, MSc., CISSP

Principal Security Architect Enterprise Risk and Compliance Best Buy Canada Ltd. (100% owned subsidiary of Best Buy Co., Inc.)

2

slide-3
SLIDE 3

3

WHY DO WE NEED IT, WHAT DO WE NEED AND HOW TO IMPLEMENT IT SUCCESSFULLY? A SIMPLIFIED APPROACH ALIGNED WITH AGILE’S PHILOSOPHY.

slide-4
SLIDE 4

4

WHY CHANGE? REASON #1 – THE ENEMY

Our enemy is already Agile and has been for a long time!

  • It’s highly flexible and adapting quickly to change.
  • It adopts new skills and technologies extremely fast.
  • It’s very focused and determined following its goals.

So why can’t we be like our enemy?

slide-5
SLIDE 5

5

TRADITIONAL SECURITY – THE ENFORCEMENT WAY

Enforcing security policies, standards and requirements, usually working in silos has been the traditional way of security for a long time. This approach creates waste in the business processes, sometimes even bad cross-team relationships.

slide-6
SLIDE 6

SECURITY INSIDE WALLS, REASON #2 – TEAMS

6

People Techno logy Proces ses & proce dures

Security surrounded by walls does not allow the flow of knowledge and awareness through the organization and also breeds shadow IT. People are afraid

  • f security to say “No”.
slide-7
SLIDE 7

OK, GOT IT, WE HAVE TO CHANGE

7

  • A new paradigm shift
  • Transformation of culture and mindset.
  • Security – responsibility of everyone.
  • No more silos.
  • Information security as a competitive advantage.
slide-8
SLIDE 8

8

REASON #3 – THE CUSTOMER … OR DURABLE COMPETITIVE ADVANTAGE A very important concept by the greatest investor of our time – Warren Buffett. The main question is – for a company with a business based on a technological competitive advantage, can this advantage be durable without a strong information security program to protect it? Here’s where security interconnects deeply with business and becomes part of the durable competitive advantage!

slide-9
SLIDE 9

9

WHAT IS AGILE?

  • Common name for a group of iterative and

incremental methodologies.

  • Specific mindset and style of work,

following a set of values and principles, where requirements and solutions can evolve through team collaboration.

  • Time-fixed, repeatable and self-adjusting

process.

slide-10
SLIDE 10

10

REALLY, WHAT IS AGILE?

AGI GILE

VALUES ES & PRINCIPL CIPLES ES DECISION SIONS DEVELOP LOP WORKING NG SOFTW TWAR ARE

slide-11
SLIDE 11

11

WHAT IS AGILE – A PENCIL ANALOGY Watch the YouTube video “Agile Explained... with a PENCIL!” https://www.youtube.com/watch?v=k_ndH7B-IS4

slide-12
SLIDE 12

12

WATERFALL VS. AGILE

Quality Time Cost Functionality Time Cost Quality Functionality

Waterfall Agile

Fixed Variable

slide-13
SLIDE 13

13

Waterfall methodology - first described back in 1970 by Winston Royce as “something you shouldn’t do" in his article "Managing the development of large software systems”.

HISTORY OF WATERFALL

Winston Walker Royce

(August 15, 1929 – June 7, 1995)

slide-14
SLIDE 14

FOUR CORE VALUES OF AGILE OR AGILE MANIFESTO

14

We are uncovering better ways of developing software by doing it and helping others do it. Through this work we have come to value: 1.Individual interactions over processes and tools. 2.Working software over comprehensive documentation. 3.Customer collaboration over contract negotiations. 4.Responding to change over following a plan. That is, while there is value in the items on the right, we value the items on the left more.

slide-15
SLIDE 15

15

12 PRINCIPLES OF AGILE

  • 1. Satisfy the customer.
  • 2. Welcome change.
  • 3. Deliver frequently.
  • 4. Work together.
  • 5. Trust, support & motivate.
  • 6. Face-to-face communication.
slide-16
SLIDE 16

16

  • 7. Working software.
  • 8. Sustainable development.
  • 9. Continuous attention to technical excellence.
  • 10. Simplicity is essential.
  • 11. Self-organized teams.
  • 12. Reflect and adjust.

12 PRINCIPLES OF AGILE

slide-17
SLIDE 17

17

KEY FACTS ABOUT AGILE

  • It’s driven by reality and customer requirements.
  • It’s focused on end user/customer, i.e. the business.
  • It’s based on free communication and open collaboration.
  • It takes reward/risk into account.
  • It’s characterized with timely and rapid delivery of results.
  • It’s highly adaptable to change, using course corrections natively.
  • It relies on discipline and focus.
slide-18
SLIDE 18

18

THE SCRUM METHODOLOGY

Sprint planning Sprint review & retrospect

slide-19
SLIDE 19

19

Product Owner

MAIN ROLES IN A PRODUCT STREAM

Scrum Master Team Members Business Users

slide-20
SLIDE 20

WHAT IS A USER STORY?

20

As a < type of user >, I want < some function>, so that < some benefit >

Example: As a web site user, I want to be able to login, so I can access my personalized dashboard.

slide-21
SLIDE 21

21

EFFECTIVE COLLABORATION IS PARAMOUNT

  • Open collaborative environment.
  • Teams engage and share ideas easily

and without constrains.

  • No more working in silos.
  • Everyone as a team is responsible for

the success as well as the failure.

slide-22
SLIDE 22

22

Improve efficiency. Better use of resources. Empower the human talent. Don’t reinvent the wheel.

AUTOMATION EVERYWHERE

Popular automation tools:

slide-23
SLIDE 23

SOLUTIONS THAT MATTER

23

How to make sure security becomes integral part of Agile? Key paradigm shift: Security – responsibility of EVERYONE!

slide-24
SLIDE 24

24

SECURITY CHAMPIONS PROGRAM

  • A key strategy to address security in the Agile environment.
  • Adopted successfully by many organizations.
  • Creates strong bond between Security and Agile teams.
slide-25
SLIDE 25

25

INDUSTRY TRENDS

“By 2021, 35% of enterprises will implement a security champions program, up from less than 10% in 2017” Gartner

slide-26
SLIDE 26

26

MAIN OBJECTIVES

  • Develop Working and Secure Code.
  • Manage Security Risk for Agile.
  • Do everything the Agile way.
slide-27
SLIDE 27

27

OWASP DEFINITION

  • Security Champions are active members of

a team that may help to make decisions about when to engage the Security Team

  • Act as the "voice" of security for the given

product or team

  • Assist in the triage of security bugs for their

team or area

slide-28
SLIDE 28

28

SECURITY CHAMPION’S ROLE

  • Act as a security ambassador in their product streams.
  • Communicate CoP (Community of Practice) decisions and

knowledge back to the teams.

  • Assess security impact and risk at the high level.
  • Make decisions about engaging Security.
  • Develop “evil stories” for their team’s sprints.
  • Review and approve usage of third party libraries.
  • Have these responsibilities in their PA goals.
slide-29
SLIDE 29

29

HOW TO RUN THE SECURITY CHAMPIONS PROGRAM? Communicate – simplify the security concepts for the Agile teams and don’t reinvent the wheel, but utilize the full potential of popular Agile tools, such as Confluence/Jira. Step 1

slide-30
SLIDE 30

30

HOW TO RUN THE SECURITY CHAMPIONS PROGRAM? Step 2 Collaborate – make it easy for the Agile teams to engage security, again, by utilizing the full potential of the widely used Agile tools.

slide-31
SLIDE 31

31

HOW TO RUN THE SECURITY CHAMPIONS PROGRAM? Step 3 Coach – training and coaching is the key to achieve competence across the board and build trust. Coaching of security knowledge must follow the Agile values and principles in a complete sync.

slide-32
SLIDE 32

32

HOW TO RUN THE SECURITY CHAMPIONS PROGRAM? Step 4 Trust – build strong team relationship, based on mutual trust. It should come naturally as a result of executing successfully the above steps from 1 to 3.

slide-33
SLIDE 33

33

HOW TO RUN THE SECURITY CHAMPIONS PROGRAM? Step 5 Deputize – delegate responsibilities, based on the strong foundation of trust.

slide-34
SLIDE 34

34

HOW TO RUN THE SECURITY CHAMPIONS PROGRAM? Step 6 Quantify – build statistics using easy to implement metrics in order to measure the progress and to provide adjustments that further improve the overall process.

slide-35
SLIDE 35

SOME PRACTICAL TASKS

35

  • Organize continuous training sessions, preferably bi-weekly.
  • Constantly improve the resources for Security Champions:
  • By creating ‘Secure Coding Cheat sheet’.
  • By offering online training resources for continuous self-

training (ex. Hacksplaining.com).

  • By

constantly updating the ‘Secure Code’ Confluence page, following the industry.

  • Possibly provide a tool for each team to create and use Evil-

Stories within each sprint – i.e. Microsoft Threat Modeling Tool.

slide-36
SLIDE 36

36

  • An innovative idea by the OWASP team.
  • Simplifies the threat modeling process for

Agile and makes it easier to understand.

  • Provides an Agile-friendly method of

including security requirements in each sprint cycle.

  • Can be easily embedded in the process

for each Agile sprint in the backlog as security task to “fight evil”.

THE CONCEPT OF “EVIL STORIES”

slide-37
SLIDE 37

37

EXAMPLE OF A SECURITY STORY

Security Story Backlog Tasks SAFECode Fundamental Practices CWE-ID As a(n) architect/developer, I want to ensure AND as QA, I want to verify that cross-site request forgery attacks are prevented. * Use one of the many available libraries and frameworks that takes CSRF into account. * Defend against cross-site scripting Story. * Do not use HTTP GET for any method that effects a change in system state. * Use Anti-Cross Site Scripting (XSS) Libraries * Validate Input and Output to Mitigate Common Vulnerabilities * Use Logging and Tracing CWE- 352

slide-38
SLIDE 38

38

HELPFUL TOOLS

Microsoft Threat Modeling Tool 2016 (free to download)

SAFECode Practical Security Stories and Security Tasks for Agile Development Environments (34 pages PDF document)

Enterprise Tools Education and training https://www.hacksplaining.com/

slide-39
SLIDE 39

39

FOCUS ON COACHING The Agile Security process is focused on iterative and self- adjusting coaching and general awareness initiatives towards the goal

  • f

making security everyone’s responsibility.

slide-40
SLIDE 40

40

Evil stories To-Do: “Fight Evil” Security stories Code Analysis Secure Increment Definition of “Done” Acceptance Criteria

  • Evil stories are created for

each sprint and are broken down to “fight evil” security stories and to-do tasks & components which represent the security requirements.

  • Static

code scans are performed in each sprint cycle.

  • Secure

increments are released to production in an automated fashion.

SCRUM WITH EMBEDDED SECURITY

slide-41
SLIDE 41

41

DO WE HAVE TO CHANGE AGILE? Not really. It’s all about interpretation of the “working and valuable software” phrase from customer’s perspective. Working and valuable also means SECURE! But even if you add “secure” to Agile’s values and principles, it still doesn’t change its philosophy!

slide-42
SLIDE 42

42

Closing remarks

Security must be Agile and Agile adopts security naturally! Change is inevitable – embrace it! Everyone benefits from it!

slide-43
SLIDE 43

QUESTIONS?

43

“The important thing is not to stop questioning. Curiosity has its own reason for existing.” Albert Einstein

slide-44
SLIDE 44

THANK YOU!

44