SlideShare a Scribd company logo
How to Build Security and Risk
Management into Agile
Environments
By Dan Blum
October 11, 2017
1Copyright @ 2017, Security Architects, LLC
Today’s Speaker
http://www.security-architect.com
2
Security Architects Partners:
 A highly-experienced group of trusted
advisors
 Founded and directed Burton Group
consulting practices
 Co-developed, and perfected Burton
Group's Reference Architecture
 Acquired by, and played key roles at,
the world-famous Gartner, Inc.
 With core expertise in: Security
Programs, Risk Management, Identity
Management, Cloud Security,
Application Security, and much more.
 Dan Blum
Managing Partner,
Principal Consultant
• Leads and delivers large identity & security
consulting projects, spanning multiple industries
• Specializing in data protection and risk
management
• Full security program roadmap
• Identity management strategies
• Data protection – IAM, DLP, encryption, and
privacy
• Enterprise authorization frameworks
• Cloud security strategies
• Privileged access management
• Former Gartner Golden Quill award winner and
honored as Privacy by Design Ambassador
Copyright @ 2017, Security Architects, LLC
 Challenges
 Good practices
 Agile risk management
3
Agenda
Copyright @ 2017, Security Architects, LLC
 Many organizations have adopted the agile methodology and/or moved to
DevOps and CICD support models
 Often, these practices leave Information security pros tearing their hair out!
 Insisting on traditional waterfall-based security processes is not an
option
 “Business developers come to central IT asking for solutions to a problem and are
told it will take 6 months. Then it’s late. They won’t be back.” – Corporate Client
4
Problem Statement:
Is Agile Security an Oxymoron?
Copyright @ 2017, Security Architects, LLC
5
Agile Terminology
Key points
 Now a dominant programming
paradigm
 Learn by doing - Emphasis on
starting small and iterating
 Some companies even use agile
project delivery methods for
ALL projects
 Small cross-functional teams
given end to end responsibility
for the product
Agile
6
Avoid “Bad Agile”
Source: Adapted from
http://blog.crisp.se/2014/10/08/henrikkniberg/what-is-scrum
No plan
No specs
Rough,
adaptive plan
Rough,
adaptive specs
Overly-
detailed plan
Overly-
detailed specs
Good Agile!
Waterfall?Bad Agile!
Iterative
spec update
7
CI/CD Terminology
Key points
 Integrated “DevOps” teams gain efficiency, may lose separation of duty
 Automated “infrastructure-as-code”
 Continuous deployment = lights out data center
Code Unit
test
Integrate Acceptance
test
Deploy to
production
Manual
Continuous Delivery
Continuous Deployment
AutoAutoAuto
Code Unit
test
Integrate Acceptance
test
Deploy to
production
AutoAutoAutoAuto
DEV OPS
8
Hey Security Pro: It’s not all
Bad!
Key points
 Now a dominant programming
paradigm
 Learn by doing - Emphasis on
starting small and iterating
 Some companies even use agile
project delivery methods for
ALL projects
 Small cross-functional teams
given end to end responsibility
for the product
Maybe they could assume more
responsibility for security…
Agile
9
Hey Security Pro: It’s not all
Bad!
Key points
 Integrated “DevOps” teams gain
efficiency, may lose separation of
duty
 Automated “infrastructure-as-
code”
 Microservices used to bring agility
and portability
 Continuous deployment = lights
out data center
Reduced malware dwell time in frequently-
refreshed production images
No “remote in” for production support
 Challenges
 Good practices
 Agile risk management
10
Agenda
Copyright @ 2017, Security Architects, LLC
11
Shift-Left Security into the
CI/CD Pipeline
Plan Code Test Release DeployPackage Run Monitor
Dynamic
app sec
testing
Apply prod
security
config
Vuln/Config
mgmt
Dynamic
app sec
testing
Static app
sec
testing
SDLC
security &
training
DEV
Audit
Pen Test
Vuln
scan
PROD
12
Integrate Security and
Development Teams
Source: Full stack agile blog
http://www.full-stackagile.com/2016/02/14/team-organisation-squads-chapters-tribes-and-guilds/
 Standardize SDLC methodologies used in the company
 Integrate security-related documentation and other
processes into standard issues-tracking systems
 Automation is good, but not everything can be automated
 Use “Breaker” role
 Separation of duty where needed
13
More Good Practices
Copyright @ 2017, Security Architects, LLC
 Challenges
 Good practices
 Agile risk management
14
Agenda
Copyright @ 2017, Security Architects, LLC
15
ISO 31000: Traditional Risk
Management Framework
Copyright @ 2017, Security Architects, LLC
Establishing the Context
Risk Assessment
Identification Analysis Evaluation
Risk Treatment
Communication
Monitoring and
Review
16
Adapted for the Agile
Enterprise
Copyright @ 2017, Security Architects, LLC
17
High-Level Overview of the
Agile Risk Process
Copyright @ 2017, Security Architects, LLC
18
Instrumentation is Key!
• Instrumentation, procedures,
and tools we’ve tailored for
squads
• Risk profile
• Issue-to-risk triage
• Lightweight risk assessment
• Focused risk assessment tools
we’ve developed for the
experts
• Threat class heat map
• Threat actor library
• Control effectiveness
assessment method
• Control library
• Risk advisory memos
• Strategic risk register
Copyright @ 2017, Security Architects, LLC
Squads are
doing a lot!
The Experts
19
Factor Analysis of Information Risk
(FAIR) Meets Agile
• Use of quantitative estimates in lightweight risk
assessments
• The quantitative approach has value even with low precision
estimates; it makes them comparable for the purposes of roll-up,
analytics, and continuous improvement
• Use of loss expectancy model and other advanced FAIR
concepts in
• Developing risk models used for both operational and strategic
focused risk assessments
Source: Open Group Standard Risk Taxonomy (O-RT), Version 2.0
 Embrace agile security – the Change is Good
 We should have had “Shift-left” and “integrated
security and development” all along!
 Build risk-informed operational risk management into
the agile process
 Escalate strategic risk management to the pros
 Align on the Open FAIR models
20
Conclusion
Copyright @ 2017, Security Architects, LLC
Ask me Anything!
Dan Blum
Security Architects Partners
http://security-architect.com
dan.blum@security-architect.com
+1 (301) 585-4717
21
Ad

More Related Content

What's hot (20)

Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
Nis
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
OneLogin
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
Raleigh ISSA
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
BeyondTrust
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
Ryan Gallavin
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
Aujas
 
Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]
AgilePractitionersIL
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
Lance Peterman
 
Rsa archer training
Rsa archer trainingRsa archer training
Rsa archer training
Global Online Trainings
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
IBM Security
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
Lance Peterman
 
CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy Intro
CyberArk
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
NetIQ
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Risk Analysis Consultants, s.r.o.
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3
Marco Di Martino
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
BeyondTrust
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
Nis
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
OneLogin
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
Raleigh ISSA
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
BeyondTrust
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
Ryan Gallavin
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
Aujas
 
Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]Technical debt in cyber ark [agile practitioners-2015]
Technical debt in cyber ark [agile practitioners-2015]
AgilePractitionersIL
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
Lance Peterman
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
IBM Security
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
Lance Peterman
 
CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy Intro
CyberArk
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
NetIQ
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3
Marco Di Martino
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
BeyondTrust
 

Similar to How to Build Security and Risk Management into Agile Environments (20)

Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
 
Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps Webinar – Risk-based adaptive DevSecOps
Webinar – Risk-based adaptive DevSecOps
Synopsys Software Integrity Group
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
John Masiliunas
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
DevOps.com
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
Cloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsCloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science Teams
Boston Consulting Group
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
Tej Luthra
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
lior mazor
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Cloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsCloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science Teams
Boston Consulting Group
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Synopsys Software Integrity Group
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Livingstone Advisory
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and Secure
Denim Group
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
John Masiliunas
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
DevOps.com
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
Cloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsCloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science Teams
Boston Consulting Group
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
 
Secure DevOPS Implementation Guidance
Secure DevOPS Implementation GuidanceSecure DevOPS Implementation Guidance
Secure DevOPS Implementation Guidance
Tej Luthra
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Synopsys Software Integrity Group
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
lior mazor
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Eryk Budi Pratama
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
DevOps.com
 
Cloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science TeamsCloud-native Enterprise Data Science Teams
Cloud-native Enterprise Data Science Teams
Boston Consulting Group
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
Amien Harisen Rosyandino
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
Synopsys Software Integrity Group
 
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Navigating the risks in implementing Hybrid Cloud, Agile and Project Manageme...
Livingstone Advisory
 
Agile and Secure
Agile and SecureAgile and Secure
Agile and Secure
Denim Group
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Dilum Bandara
 
Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?Why Security Engineer Need Shift-Left to DevSecOps?
Why Security Engineer Need Shift-Left to DevSecOps?
Najib Radzuan
 
Ad

Recently uploaded (20)

The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Ad

How to Build Security and Risk Management into Agile Environments

  • 1. How to Build Security and Risk Management into Agile Environments By Dan Blum October 11, 2017 1Copyright @ 2017, Security Architects, LLC
  • 2. Today’s Speaker http://www.security-architect.com 2 Security Architects Partners:  A highly-experienced group of trusted advisors  Founded and directed Burton Group consulting practices  Co-developed, and perfected Burton Group's Reference Architecture  Acquired by, and played key roles at, the world-famous Gartner, Inc.  With core expertise in: Security Programs, Risk Management, Identity Management, Cloud Security, Application Security, and much more.  Dan Blum Managing Partner, Principal Consultant • Leads and delivers large identity & security consulting projects, spanning multiple industries • Specializing in data protection and risk management • Full security program roadmap • Identity management strategies • Data protection – IAM, DLP, encryption, and privacy • Enterprise authorization frameworks • Cloud security strategies • Privileged access management • Former Gartner Golden Quill award winner and honored as Privacy by Design Ambassador Copyright @ 2017, Security Architects, LLC
  • 3.  Challenges  Good practices  Agile risk management 3 Agenda Copyright @ 2017, Security Architects, LLC
  • 4.  Many organizations have adopted the agile methodology and/or moved to DevOps and CICD support models  Often, these practices leave Information security pros tearing their hair out!  Insisting on traditional waterfall-based security processes is not an option  “Business developers come to central IT asking for solutions to a problem and are told it will take 6 months. Then it’s late. They won’t be back.” – Corporate Client 4 Problem Statement: Is Agile Security an Oxymoron? Copyright @ 2017, Security Architects, LLC
  • 5. 5 Agile Terminology Key points  Now a dominant programming paradigm  Learn by doing - Emphasis on starting small and iterating  Some companies even use agile project delivery methods for ALL projects  Small cross-functional teams given end to end responsibility for the product Agile
  • 6. 6 Avoid “Bad Agile” Source: Adapted from http://blog.crisp.se/2014/10/08/henrikkniberg/what-is-scrum No plan No specs Rough, adaptive plan Rough, adaptive specs Overly- detailed plan Overly- detailed specs Good Agile! Waterfall?Bad Agile! Iterative spec update
  • 7. 7 CI/CD Terminology Key points  Integrated “DevOps” teams gain efficiency, may lose separation of duty  Automated “infrastructure-as-code”  Continuous deployment = lights out data center Code Unit test Integrate Acceptance test Deploy to production Manual Continuous Delivery Continuous Deployment AutoAutoAuto Code Unit test Integrate Acceptance test Deploy to production AutoAutoAutoAuto DEV OPS
  • 8. 8 Hey Security Pro: It’s not all Bad! Key points  Now a dominant programming paradigm  Learn by doing - Emphasis on starting small and iterating  Some companies even use agile project delivery methods for ALL projects  Small cross-functional teams given end to end responsibility for the product Maybe they could assume more responsibility for security… Agile
  • 9. 9 Hey Security Pro: It’s not all Bad! Key points  Integrated “DevOps” teams gain efficiency, may lose separation of duty  Automated “infrastructure-as- code”  Microservices used to bring agility and portability  Continuous deployment = lights out data center Reduced malware dwell time in frequently- refreshed production images No “remote in” for production support
  • 10.  Challenges  Good practices  Agile risk management 10 Agenda Copyright @ 2017, Security Architects, LLC
  • 11. 11 Shift-Left Security into the CI/CD Pipeline Plan Code Test Release DeployPackage Run Monitor Dynamic app sec testing Apply prod security config Vuln/Config mgmt Dynamic app sec testing Static app sec testing SDLC security & training DEV Audit Pen Test Vuln scan PROD
  • 12. 12 Integrate Security and Development Teams Source: Full stack agile blog http://www.full-stackagile.com/2016/02/14/team-organisation-squads-chapters-tribes-and-guilds/
  • 13.  Standardize SDLC methodologies used in the company  Integrate security-related documentation and other processes into standard issues-tracking systems  Automation is good, but not everything can be automated  Use “Breaker” role  Separation of duty where needed 13 More Good Practices Copyright @ 2017, Security Architects, LLC
  • 14.  Challenges  Good practices  Agile risk management 14 Agenda Copyright @ 2017, Security Architects, LLC
  • 15. 15 ISO 31000: Traditional Risk Management Framework Copyright @ 2017, Security Architects, LLC Establishing the Context Risk Assessment Identification Analysis Evaluation Risk Treatment Communication Monitoring and Review
  • 16. 16 Adapted for the Agile Enterprise Copyright @ 2017, Security Architects, LLC
  • 17. 17 High-Level Overview of the Agile Risk Process Copyright @ 2017, Security Architects, LLC
  • 18. 18 Instrumentation is Key! • Instrumentation, procedures, and tools we’ve tailored for squads • Risk profile • Issue-to-risk triage • Lightweight risk assessment • Focused risk assessment tools we’ve developed for the experts • Threat class heat map • Threat actor library • Control effectiveness assessment method • Control library • Risk advisory memos • Strategic risk register Copyright @ 2017, Security Architects, LLC Squads are doing a lot! The Experts
  • 19. 19 Factor Analysis of Information Risk (FAIR) Meets Agile • Use of quantitative estimates in lightweight risk assessments • The quantitative approach has value even with low precision estimates; it makes them comparable for the purposes of roll-up, analytics, and continuous improvement • Use of loss expectancy model and other advanced FAIR concepts in • Developing risk models used for both operational and strategic focused risk assessments Source: Open Group Standard Risk Taxonomy (O-RT), Version 2.0
  • 20.  Embrace agile security – the Change is Good  We should have had “Shift-left” and “integrated security and development” all along!  Build risk-informed operational risk management into the agile process  Escalate strategic risk management to the pros  Align on the Open FAIR models 20 Conclusion Copyright @ 2017, Security Architects, LLC
  • 21. Ask me Anything! Dan Blum Security Architects Partners http://security-architect.com [email protected] +1 (301) 585-4717 21

Editor's Notes

  • #6: http://www.seleniumframework.com/cucumber-2/make-a-case/continuous-test-automation/ http://www.bmc.com/blogs/9-steps-building-pipelines-continuous-delivery-deployment/ http://electric-cloud.com/resources/continuous-delivery-101/continuous-deployment/
  • #8: Related reading http://www.softcrylic.com/blogs/testing-strategies-continuous-delivery/ http://www.seleniumframework.com/cucumber-2/make-a-case/continuous-test-automation/ http://www.bmc.com/blogs/9-steps-building-pipelines-continuous-delivery-deployment/ http://electric-cloud.com/resources/continuous-delivery-101/continuous-deployment/
  • #9: http://www.seleniumframework.com/cucumber-2/make-a-case/continuous-test-automation/ http://www.bmc.com/blogs/9-steps-building-pipelines-continuous-delivery-deployment/ http://electric-cloud.com/resources/continuous-delivery-101/continuous-deployment/