empowering secure agile teams · 2019-06-08 · • a/b testing • customer communications. work...

12
http://secse.org/ Oxford, June 4 2019 Frank Aakvik [email protected] Security and Privacy Officer, Telenor Software Lab Empowering Secure Agile Teams 1

Upload: others

Post on 23-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

http://secse.org/ Oxford, June 4 2019

Frank Aakvik [email protected] and Privacy Officer, Telenor Software Lab

Empowering Secure Agile Teams

1

Page 2: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Telenor Software Lab

2

• ...• ...• ...• ...

Client Team (8 ppl.)• Client logic• Web, Native Mobile, Legacy

Backend Team (4 ppl.)• Business logic• Client endpoints (proxy)• Authentication/Authorisation

Solutions Engineering (9 ppl.)• Quality Assurance/Test• Continuous Integration• Facilities Management• Security/Privacy

Operations (4 ppl.)• Remote/Local Storage• Remote/Local Hosting• Local Infrastructure

TSL

Marketing (2 ppl.)• Product Strategies• A/B Testing• Customer communications

Page 3: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Work Environment

3

Page 4: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Security Processes in Agile

4

1. Situation / Challenges

2. Implications / Consequences

3. Solution / Plan of Approach

Page 5: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Challenges

5

Situation / Observation Implication / Consequences

• Need for continuously reviewing the design• Cannot wait for an open time slot with specialists

• Difficult to verify adequate security-/privacy coverage• Difficult to communicate need for a security focus• Difficult to place responsibility for sufficient control

• Security/Privacy (features) should be “owned” by the PO?

• E.g. technical complexity frightens PO from addressing-> assumptions are made on coverage

• Wait until someone else fixes the problem

• Continuous Delivery/Continuous Deployment

• Lacking documentation on security-/privacy requirements (specific for the business)

• Agile manifesto “dictates” (feature) ownership (PO)

• Security features are difficult to understand

• Security is “outside our control”/Not my job

Page 6: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Roles

6

Developer

QA

PO

CI Engineer

Security/Privacy

Designer

Page 7: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Security Requirements

7

• Control (confidentiality, integrity)

• Availability

• Privacy (Authorisation)

• Governance

○ Confidentiality/Sourcing

• Data Regulation Authorities (National/International)

○ GDPR

• Coding guidelines

• Test methods

• Data classification

End User Req.

Company Req.

Laws and

Regulations

Best Practices

• Incident reports

• Static Analysis

• Dynamic Analysis/Testing

Lessons Learned

Page 8: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

8

Performers/Stakeholders

Product Team

Developers

Test/QA

Security Team

v. 0.9.1a

Lessons Learned!!

Page 9: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Risk Assessment and Mitigation Planning

9

Triggered on incidents

Triggered by (static) security requirements

- Need a more dynamic approach to discovering relevant risk

Conclusion

• Doesn’t necessarily have to be a relevant risk at the time• Requirements may change as security awareness matures

• Relies on bad stuff happening -> #notonmywatch• Only discovered when bad stuff happens!!

Page 10: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Tracking changes

10

Page 11: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Enter Threat Modelling

11

Empowers the developers with the ability to discover threat as early as possible

Conclusion

Security Champions

SPOOFING

TAMPERING

REPUDIATION

INFORMATION

DISCLOSURE

DENIAL OF

SERVICE

ELEVATION OF

PRIVILEGE

STRIDE

• Provide for security awareness/competency• Implements security/privacy by design• Data flow perspective (relevancy)

Page 12: Empowering Secure Agile Teams · 2019-06-08 · • A/B Testing • Customer communications. Work Environment 3. Security Processes in Agile 4 1. Situation / Challenges 2. Implications

Goals and objectives

12

Short Term

• Increase focus on Security/Privacy awareness

• More focus on Security and Privacy by Design-> Threat modelling -> RAMP

• Increase focus on security/privacy in Management• Provide more information on development methodology in governing orgs.

Long Term

• Include more versatile resources in threat modelling and RAMP• Confluence for requirement specification• Invite third parties to do frequent audits

• Reduce incident response time

Incidents/Issues Plan of Approach – Long and Short Term

8

5

2018 2019