Gartner 2017 - Launch An API-First Secure Development Strategy
Gartner 2017 - Launch An API-First Secure Development Strategy
OBJECTIVE
Launch a multiyear initiative to build security services and APIs that developers can use to quickly incorporate high-
impact, reusable security functionalities into the applications without requiring specialized security skills and training.
1. Provide developers with security functionalities as reusable services, similar to any other business functionalities.
2. Think strategically about how to stimulate the initial growth and build momentum for success by addressing
funding, API management, and developer engagement challenges.
3. Prioritize building APIs for core security functionalities that deliver high business and security impact.
4. Make API usage the default option for developers by partnering with key functions to embed tools and training in
developer ecosystems.
COMPANY SNAPSHOT
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
1
To reduce the time
PROVIDE REUSABLE FUNCTIONALITIES
1
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
2
An API-first strategy
PLAN FOR THE SHORT- AND LONG TERM
1
API Consumption Introduce security services and APIs Set expectations with Applications
as part of the broader development leaders that their teams meet
ecosystem by plugging into existing progressively higher consumption
processes and workflow. targets for security functionalities;
eventually tighten policies and
standards over API use when not overly
burdensome on developers.
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
3
To maximize the value
PRIORITIZE CORE FUNCTIONALITIES
1
■■ Domain-specific ■■ Authorization
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
4
Identify cross-functional
DRIVE API CONSUMPTION
1
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
5
Bolt dramatically
RESULTS
1
improved developers’
willingness and ability to
build security features
into their applications Information Security Received Additional
and approved $2.4 Funding to Expand the Program
million in funding to Investment Level
expand the API program.
$2,500,000 6x
$2,400,000
500%
Increase
$1,250,000
saver and keeps me focused on
what really matters: shipping code.”
Front-End Software Developer
Bolt Financial Group
1x
$400,000
$0
Before After
Source: Bolt Financial Group; CEB analysis.
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
6
IMPLEMENTATION GUIDE
Web Security Proxies, Reverse Proxies/Access Gateways, Web Filtering, SSL Decryption, Phishing Protective, Detective,
Site Blocking, E-Mail-Security, Web Monitoring, Anti-Spam, Web Threat Detection Reactive
Encryption VPN, Certificate and Encryption Key Management,a Virtual Storage, Protective
Communications Encryption, Application Encryption, Database Encryption, Digital
Signatures
Network Security Network Segmentation, Firewalls, Web App Firewalls, DDoS, DLP, IR Management, Detective, Protective,
IDS/IPS, Security Gateways, AV/Malware Reactive
Security Information Log Management,a Event Correlation, Security/Incident Response, Scalability, Log/ Detective
and Event Management Event Storage, Search
E-Mail Security DLP for E-Mail, Content Security, E-Mail Encryption, Anti-Virus/Anti-Malware Protective, Detective,
Reactive
Intrusion Management Packet Inspection, Identification/Prevention of Intrusions and Policy Violations, IR Detective, Protective,
Management Reactive
Business Continuity and Backup, File Recovery, Third-Party Agreements, Replication, Disaster Recovery Reactive, Protective,
Disaster Recovery Detective
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
7
IMPLEMENTATION GUIDE
13%
1. Build security services required for core
Pro Fees
Key Deliverables
Challenge Solution
■■ One-off security implementations in applications do not ■■ Standardize the process of securing applications.
provide scalability. ■■ Provide easily consumable microservices for application
■■ Security is mostly done on a bespoke basis. development teams.
■■ Systems do not scale for enterprise use. ■■ Build sustainable and scalable security functionalities.
■■ Each application development group rebuilds the integration
layer for security.
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
8
IMPLEMENTATION GUIDE
LEVEL 1 2 3 4 5
SECURE SOFTWARE
FUNDAMENTALS OF
PRACTITIONER LEARNING BY APPSEC WARRIOR APPSEC CHAMPION
APPLICATION
(SSP) LEARNING PLAYING PROGRAM PROGRAM
SECURITY
PROGRAM
BASIC INTERMEDIATE ADVANCED
KNOWLEDGE Series of mandatory Series of optional TalentLink Gamification Learning 9-Month In-Class & Self-Paced Intensive 3-Month Coaching
LEVEL TalentLink courses assigned courses Platform Learning Program Program (2 people per
to job codes quarter)
Key AppSec terminology Foundational elements Secure coding Similar to AppSec OWASP Risks / SANS
CAPABILITIES q q q q q
q Trending technologies & of software security technique Champion Program - Coding Errors
their implications q Language-specific q Vulnerable code lighter curriculum over 9 q CSSLP certification
q SDLC roles secure coding identification months instead of 3 q WebGoat
q Get ISC² certified & earn q Hands-on vulnerability months q Security Assessment
an SSP badge exploitation q BSIMM Model
q Advanced Security Tools
Being developed,
STATUS Launching June 2017 (Attention) TBD 2018
launching Q4 2017
In Progress
VP Roadshows VP Roadshows
COMMUNICATION q
Email directly to Audience
q
ü VP Roadshows
q ü TBD 2018 q Bolt Connect blogs
PLAN q Bolt Connect sites q Word of Mouth
ü Bolt Connect blogs
1
Pseudonym.
© 2017 Gartner Inc. and/or its affiliates. All rights reserved. IREC173081
9