Secure Agile Development

Similar documents
MIS Systems & Infrastructure Lifecycle Management 1. Week 12 April 7, 2016

Nick Coblentz, CISSP Senior Consultant, AT&T Consulting

Requirement Engineering within an Agile Environment BY KEJI GIWA. Digital Bananas Technology

Texas Regional Infrastructure Security Conference (TRISC) Dan Cornell

Agile Accessibility. Presenters: Ensuring accessibility throughout the Agile development process

Quality Assurance and IT Risk Management

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

Certification vision, content and streamlining of PCI certification process

Managing an Application Vulnerability Management Program in a CI/CD Environment. March 29, 2018 OWASP Vancouver - Karim Lalji 1

User Documentation Development Life Cycle (UDDLC)

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning

Building Security Into Applications

Kanban One-Day Workshop

What s a BA to do with Data? Discover and define standard data elements in business terms

Threat Modeling for System Builders and System Breakers!! Dan Copyright 2014 Denim Group - All Rights Reserved

Exam Questions

Product Security Program

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

This tutorial also elaborates on other related methodologies like Agile, RAD and Prototyping.

Suman Sourav Director DevSecOps, Vantage Point Security. OWASP Indonesia Day 2017

About Us. Services CONSULTING OUTSOURCING TRAINING MENTORING STAFF AUGMENTATION 9/9/2016

FedRAMP Security Assessment Plan (SAP) Training

Dr. Jenkins, M.D., at Your Service: An overview of Jenkins at. #jenkinsconf. Cerner Corporation. Jenkins User Conference San Francisco

HOW TO WRITE USER STORIES (AND WHAT YOU SHOULD NOT DO) Stuart Ashman, QA Director at Mio Global Bob Cook, Senior Product Development Manager, Sophos

IT Consulting and Implementation Services

MIS Week 9 Host Hardening

Testing Agile Projects Stuart Reid

FedRAMP JAB P-ATO Process TIMELINESS AND ACCURACY OF TESTING REQUIREMENTS. VERSION 1.0 October 20, 2016

Click to edit Master title style. DIY vs. Managed SIEM

Mobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing

How to Build an Appium Continuous Testing Pipeline

enya Agile vs. Cyber Communications Ltd. Samuel Wanderi MSIM CAIS CISSP CCNA GSLC CEH COR

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

LESSONS LEARNED: BEING AGILE IN THE WATERFALL SANDBOX

AppScan Deployment APPLICATION SECURITY SERVICES. Colin Bell. Applications Security Senior Practice Manager

Maturing agile teams and driving quality through architecture principles

Performance Engineering in Agile February 9, 2016

Secure Agile How to make secure applications using Agile Methods Thomas Stiehm, CTO

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Agile Software Development. Software Development Methodologies. Who am I? Waterfall. John York JOHN YORK EECS 441 FALL 2017 A BRIEF LOOK

Collaboration at Scale: Prioritizing a Backlog. 13-Dec-2017

Agile Software Development. Software Development Methodologies. Who am I? Waterfall. John York JOHN YORK EECS 441 WINTER 2018 A BRIEF LOOK

Shift Left, Automation, and Other Smart Strategies for Getting Ahead in QA

THE ART OF SECURING 100 PRODUCTS. Nir

American Association for Laboratory Accreditation

Product Roadmap & Getting Started ITO LMS

FedRAMP Training - Continuous Monitoring (ConMon) Overview

LEADING WITH GRC. Approaching Integrated GRC. Knute Ohman, VP, GRC Program Manager. GRC Summit 2017 All Rights Reserved

SDLC Maturity Models

Testing in the Agile World

Agile Project Management with Primavera

<Insert Picture Here> CxP Design Sprint

Administering SQL Servers for Development Teams. Mike Acord & Tony Sebion Omni Resources

DESIGN HELPED A MAJOR AND HIGHER SOFTWARE CUSTOMER SUCCESS STORY ABOUT THE CLIENT

Automated Acceptance testing by Developers & Automated Functional Testing by Testers

OWASP 5/07/09. The OWASP Foundation OWASP Static Analysis (SA) Track Session 1: Intro to Static Analysis

What every IT professional needs to know about penetration tests

Service Management Practice Overview. Pete Swan )

M365 Powered Device Proof of Concept

Sirius Security Overview

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

COBIT 5 Assessor Certification Course

Agile Internationalization User Stories

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Case Management Digital Service Sprint Review Sprint 5.1: 11/16/17 11/29/17. CWDS / Child Welfare Digital Services

How to shift from compliance to proactive security

AGILE. Getting Started on Your Team. Davisbase. Copyright 2011 Davisbase LLC. Licensed for Classroom Use to ASPE for Webinar Use Only

RiskSense Attack Surface Validation for IoT Systems

Development*Process*for*Secure* So2ware

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Hacker Explains Privilege Escalation: How Hackers Get Elevated Permissions

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

USER MANUAL. Inprowiser Engineering

Unlocking the Power of the Cloud

On-Premise, Cloud, Or Managed Service. Making The Most Of Information Management Technology & People

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator

Application security : going quicker

Requirements Testing: Turning Compliance into Commercial Advantage. Mike Bartley, Test and Verification Solutions

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

Introduction to the Federal Risk and Authorization Management Program (FedRAMP)

SECURITY AUTOMATION SIMPLIFIED VIA NIST OSCAL: WE RE NOT IN KANSAS ANYMORE

Contemporary Challenges for Cloud Service Providers Seeking FedRAMP Compliance

An Aflac Case Study: Moving a Security Program from Defense to Offense

Development with Scrum

Best Practices in Securing a Multicloud World

113 BSIMM Activities at a Glance

IT-CNP, Inc. Capability Statement

Final Paper/Best Practice/Tutorial Advantages OF BDD Testing

Test Automation Strategies in Continuous Delivery. Nandan Shinde Test Automation Architect (Tech CoE) Cognizant Technology Solutions

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

FedRAMP Training - How to Write a Control. 1. FedRAMP_Training_HTWAC_v5_ FedRAMP HTWAC Online Training Splash Screen.

Improving Cybersecurity through the use of the Cybersecurity Framework

Information Technology Procedure IT 3.4 IT Configuration Management

CASE STUDY TELECOMS. Calvi - two years with no database-related bugs

RAPID7 INFORMATION SECURITY. An Overview of Rapid7 s Internal Security Practices and Procedures

Put Security Into Your DevOps NOW. Or Prepare for the Flood Matthew Fisher Solution Architect, Fortify Federal 08MAR2018

Incident Response Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

Transcription:

Secure Agile Development With FISMA Compliance /

FYRM Overview Qualifications Experience Respected Partner FedRAMP 3PAO Performance CPAR 4/4 CMS, DOE Fortune 500 Strategy Secure Agile Knowledge Sharing Effective & Efficient Projects completed: On time Accurately Within budget 2 May 31, 2017

Agenda Agile Overview Integrating Security into an Agile World FISMA Compliance Integration Recommendations for success 3 May 31, 2017

Agile Overview But first, let s talk about how applications are made. 1. Planning 5. Testing (QA, UAT, Security) 3. Design 2. Requirements 4. Coding / Implementation 6. Implementation 4 May 31, 2017

Agile Overview Product Planning Daily Scrum Rules of Agile Development: 1. You don't speak about the rules of Agile development 2. There are no rules of Agile Development Deployment 5 May 31, 2017

Mapping Non-Security Tasks to an Agile SDLC: Agile Overview Product Requirements Design Use Cases / Stories Planning Development goals for sprint Use Cases / Stories for sprint Deployment Goal breakdown into tasks Development tasks for use cases / stories Coding Unit Testing, Functional Testing, Code Review Scrum: Design, Planning QA Testing 6 May 31, 2017

Agile Overview No two Agile SDLC's are identical Requirem ents Remember Rule # 2: Release Design There are no rules of Agile Development Testing and QA Develop ment Scrum 7 May 31, 2017

Integrating Security into an Agile World Pen Testing Key Security Components Code Review Secure Development Training Design and Architecture Security Controls and Requirements 8 May 31, 2017

Mapping Security Tasks to an Agile SDLC: Integrating Security into an Agile World Product Security Controls and Requirements Secure Design Abuse Cases / Malicious User Stories Planning Security goals for sprint Abuse Cases / Malicious user stories for sprint Security goal breakdown into tasks Security components for development tasks and security task development Secure Coding Security Testing Scrum: Secure Design, Security Planning Deployment Security Testing 9 May 31, 2017

Integrating Security into an Agile World Product Product Product Security Framework Planning Planning Planning Input Validation Output Encoding, Daily Scrums, Daily Scrums, Daily Scrums Identify XSS Deployment Deployment Deployment n n+1 n+2 10 May 31, 2017

Integrating Security into any SDLC Design, Requirements Security controls & requirements Design and architecture Secure development training Development Security controls & requirements Design and architecture Code review Penetration testing Testing, Deployment, Operations Code review Penetration testing Control assessment 11 May 31, 2017

FISMA Compliance Integration Align activities and schedules Development activities, control testing Information Security activities, goals, projects FISMA requirements, reporting/ato deadlines Technical security testing Review security control design Code review Penetration testing Security controls assessment Obtain evidence for non-technical controls during development Align with annual testing requirements 12 May 31, 2017

FISMA Compliance Integration Security Controls In-development testing vs. Annual SCA Scrum Development meetings Release dates ATO deadline Scope Schedule Logistics Continuous Monitoring Testing Reporting security issues vs. FISMA findings Add remediation to Test environment, accounts Application testing scope Other evidence 13 May 31, 2017

Secure Agile Development Pros and Cons with Secure Agile Development Cons No security testing in "Pure" Agile More security issues more frequently Difficulty with security integration Pros "Pure" Agile is not very common Well suited for quicker remediation Improved security and compliance once integrated 14 May 31, 2017

Secure Agile Development Subject Matter Experts Secure Development SME Application Security SME Key POC's for each team Security testing logistics Environment, accounts, etc. Integrate security recommendations Integrate security remediation Recommendations to improve success Team Integration Developers learn security IS/Compliance learn development Bridge the gap Development artifacts Anti-agile Diagrams, data flow and definitions Security requirements, abuse cases 15 May 31, 2017

Presenter Matthew Flick Managing Principal matt.flick@fyrmassociates.com /