The First Security Engineer's 100-Day Checklist
The First Security Engineer's 100-Day Checklist
Engineer's 100-day
Checklist
INTRODUCTION
Damn, but security is hard.
Being the first security engineer in a startup that already operates for a few months or
even years can be quite daunting. This security checklist aims to help security engineers
and CISOs in early stage companies to prioritize their efforts in the first months of their
new job. Have feedback? Let us know!
Sqreen’s mission is to empower engineers to build secure web applications. We’ve put our
security knowledge to work in compiling an actionable list of best practices to help you
get a grip on your security priorities. It’s all on the following pages.
We hope your find if useful. If you do, share it with your network. And if you don’t, please
take to Twitter to complain loudly—it’s the best way to get our attention.
!1
PROCESS
✔ Automation is key
With the amount of tasks required, you can easily drown under less-important tasks
resulting in losing track of serious unresolved vulnerabilities and substantially diminishing
your incident response capabilities. Automate as much as possible in order to free up
valuable time for tasks that actually require human expertise and deeper analyses. Take
advantage of the multiple solutions offered in the market and of computers analytical
power.
Learn more:
• Sqreen - http://bit.ly/2MDSMTm
• Security automation is maturing, but many firms not ready for adoption - http://
bit.ly/2oMthkw
• Why automation is key for the future of cyber security - http://bit.ly/2wOvVKa
Learn more:
• Five Steps to Effectively Managing Third-Party Service Provider Risk - http://
bit.ly/2NlHsuO
• 9 Best Practices to Jumpstart your Third-Party Management Program - http://
bit.ly/2wSLf9q
• Vendor Security Assessment Questionnaire - http://bit.ly/2CsyaJ9
!2
✔ Create a flag for security-related tasks
If the company has an issue tracking system (such as JIRA), make sure the security-
related issues can be identified easily or work with the team managing the system to
create a special flag or a project. Communicate about this new category to the employees
and clarify how and when to use it. You can also use a dedicated vulnerability management
system such as ThreadFix which can be integrated with JIRA.
!3
✔ Create a flag for security-related tasks
If the company has an issue tracking system (such as JIRA), make sure the security-
related issues can be identified easily or work with the team managing the system to
create a special flag or a project. Communicate about this new category to the employees
and clarify how and when to use it. You can also use a dedicated vulnerability management
system such as ThreadFix which can be integrated with JIRA.
!4
✔ Fix the most urgent issues
Do not be alarmed or overwhelmed by the number of vulnerabilities uncovered during the
audits. All do not need to be fixed right away, you can draw up a plan to fix them over
time. However, do not defer fixing the most critical issues. If you identify a serious
vulnerability during one of the audits and security reviews, you should address and fix the
issue immediately. If you can’t fix it, mitigate it.
!5
Learn more:
• 10 Tips to Reduce Common Vulnerabilities Exploited by Cybercriminals - http://
bit.ly/2M6BFV9
• How to Prepare For Your Next Penetration Test - http://bit.ly/2NlL5AT
• 10 steps to managing a successful network penetration test - http://bit.ly/
2wPtVBx
✔ Structure and be the technical resource for the sales team and
customers
As a security engineer, you might also be the go-to resource for sales teams that require
help filling in security forms. Spend some time retrieving and structuring all the previous
requests to save time for future questionnaires.
!6
✔ Understand product development processes
As part of your exploration, you need to gather enough information from the key
stakeholders in order to have a clear understanding of the product development processes
(steps, key milestones, teams involved, governance structure…). It can be documentation
or detailed oral explanations that should be written down. It will serve as a basis when you
get to introduce security awareness and tasks within the processes.
✔ Be smart
As a security engineer your job is to improve the security of your new company. It’s
tempting to show off how much you know about security and cybersplain everyone how
insecure their setup is. Don’t just take your previous experiences and more mature
companies as the go-to model. Understand what’s at stake (risk management). It’s easy to
suffocate an agile startup with heavy security that does not scale well. Security Engineers
operate inside a business and understanding the business before enforcing GovAgency-
like security measures is key.
!7
CULTURE
!8
• Security begins with the reception desk - http://bit.ly/2CA87jA
• Ten Recommendations for Security Awareness Programs - http://bit.ly/2ws327f
• 7 elements of a successful security awareness program - http://bit.ly/
2NUWYLe
Learn more:
• Information Security Community (LinkedIn group) - http://bit.ly/2wSMPrS
• Information Systems Security Association (ISSA) - http://bit.ly/2M4yz4h
Learn more:
• 4 Essential Steps to Protect Web Applications - http://bit.ly/2QfXVPY
• OWASP Top Ten Project - http://bit.ly/2POeRgg
• AppSec USA - http://bit.ly/2NQsn1b
• Down the Security Rabbithole - http://bit.ly/2wPx1p8
!9
APPLICATION SECURITY
!10
• Auditing Applications, Part 2 - http://bit.ly/2MWQPSx
!11
✔Help engineering and business teams protect sensitive business
logics
The attacks representing the most significant business risk for our organizations are often
attacks targeting sensitive business functions of our applications. Work with business and
engineering teams to identify the biggest threats and implement monitoring and
protection solutions to automatically remediate these threats.
Integrate security automation into your app
Learn more:
• Let’s Encrypt - http://bit.ly/2wvISsi
• Microsoft encryption - http://bit.ly/2MGo64g
• MacOs encryption - https://apple.co/2wqNM9K
!12
✔Secure your emails with DMARC
Emails are usually the weak door for attacks, especially through phishing and spoofing. A
single email can make serious damages. You can implement DMARC (Domain-based
Message Authentication, Reporting and Conformance) to protect your users from
fraudulent emails.
Learn more:
• DMARC - http://bit.ly/2oMwIHW
• How to Set Up and Implement DMARC Email Security - http://bit.ly/2oLL0sh
• Build Your DMARC Record in 15 Minutes - http://bit.ly/2wXMvZd
• OnDMARC - http://bit.ly/2MXuKTS
Learn more:
• Vault Project - http://bit.ly/2wu37Hu
• AWS CloudHSM - https://amzn.to/2wxp8Ex
• Tips for private key management - http://bit.ly/2wOsT9G
• An Introduction to Managing Secrets Safely with Version Control Systems -
https://do.co/2Qbdd8A
Learn more:
!13
• Five Lessons We Learned on Our Way to Centralized Authentication - http://
bit.ly/2Cz6ZMK
• Centralized Linux Authentication - https://do.co/2wR3Dzv
!14
INFRASTRUCTURE SECURITY
Learn more:
• Sqreen - http://bit.ly/2MDSMTm
• ThreatStack - http://bit.ly/2wr8WVq
• 7 Security Measures to Protect Your Servers - https://do.co/2Qbd58R
• How To Protect SSH with Fail2Ban on Ubuntu 14.04 - https://do.co/2MV8eKt
Learn more:
• 10 physical security measures every organization should take - https://tek.io/
2oLU6Fv
!15
MONITORING
!16
✔ Build a security dashboard
Create a security dashboard to give you an overview of the security efforts. Avoid manual
reporting, all the data should be automatically provided by the solutions used.
Learn more:
• How to Conduct an Internal Security Audit in Five Simple, Inexpensive Steps -
http://bit.ly/2MQ60g5
• Prioritizing Your Security – Where Do You Begin? - http://bit.ly/2CsyAiL
Learn more:
• AWS Shield - https://amzn.to/2M4aASE
• Four ways to defend against DDoS attacks - http://bit.ly/2wRdO6x
!17
• DDoS protection, mitigation and defense: 7 essential tips - http://bit.ly/2CtvcV3
• Best DDoS protection of 2018 - http://bit.ly/2wSQbes
• Cloudflare - http://bit.ly/2C0sB4t
!18
✔ Update or build the list of devices
If you have been handed a list of the devices, make sure it is up-to-date or take time to
update the exposed machine’s information first and schedule to update the list
thoroughly as soon as possible. If the company has a BYOD policy, list those devices as
well with the identification of the employee. If there is no device list, you should build it.
The list should at least include information such as IP, type of device and physical location
if appropriate.
Learn more:
• Mobile Device Management Best Practices - https://ibm.co/2wODEYG
• Guidelines for Managing the Security of Mobile Devices in the Enterprise -
http://bit.ly/2QaAOpK
XXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX
!19
www.sqreen.io