SESSION ID: PS-F02 Integrating Our DevSecOps Product Pipeline with Software Security Standards Altaz Valani Director, Research and Insights Security Compass #RSAC #RSAC "A seed sown in good ground brings forth fruit. A principle, instilled into good mind, brings forth fruit." Blaise Pascal Outline Intentional security architecture Balanced Development Automation (BDA) Building accountability through OKRs and Team Leads Accelerating knowledge and insights generation #RSAC #RSAC What We All Want Innovate fast, stay ahead of the competition, and still be responsible with cyber security. Generate policies that leverage industry expertise around security and compliance from best practices all over the world. Built in security guidance for developers. Provide company leaders with a view into risks. Manage the dynamic nature of continually changing security standards and DevOps technologies. Bottom Line: Balanced development that achieves both security and speed 4 #RSAC Intentional Security Architecture Taking an Enterprise Perspective Being Intentional With Security Architecture BUSINESS STRATEGY (BSC VARIANT) Helping customers manage cyber security risks without slowing them down Revenue Innovative culture Customer satisfaction OUR OBJECTIVES MAPPING (SECURITY AND SPEED) COMPETENCIES (NIST 800-181) Secure Development Test & Evaluation Knowledge Management Training & Awareness Incident Response Systems Admin OUR RESULTS TRACKING VALUE STREAMS (AGILE & KANBAN) Security Requirements to Deployment Agile Pipeline Operations Support Kanban Pipeline 6 Operations Security Hybrid Pipeline #RSAC #RSAC Artifact Fabric Across Security Architecture Security Strategy Org Security Strategy Portfolio Selection Department Portfolio Portfolio Performance Requirements to Deploy Requirement Code Build Test Case Operations Security/Support Service Monitor Problem Incident 7 Security Attestation #RSAC Example Security Policies 1. All our software products must be modeled and balanced for cyber security and speed. 2. All our high priority software security requirements must be fixed before shipping. 3. Requirements not applicable must have explicit defensibility explaining why they are not applicable and must be approved by the Director of Engineering. Same goes for requirements where the risk is accepted. 4. All parties in the development lifecycle and supporting roles must be trained on our security policies and procedures. 8 Balanced Development to Achieve Both Speed and Risk SPEED #RSAC SECURITY RESEARCH STANDARDS CMLC RLC BALANCED DEVELOPMENT AUTOMATION (BDA) SDLC DEV • • AppSec dogfooding Security Requirements QMLC • • • • Attestation Per-commit linting SAST Pentest 9 OPS TEST • • Release deployment Network monitoring #RSAC Making Security Policies Actionable in BDA Limit the following request attributes: • • • • • CWE-400 Uncontrolled Resource Consumption CWE STANDARDS & FRAMEWORKS Web App SOFTWARE ARCHITECTURE 10 Request body size Number of request header fields Request header fields size Request line size XML request body size #RSAC Building in Accountability Making security objectives stick with OKRs #RSAC Making it Stick: Our OKR Journey Balanced Development OKRs ASPIRATIONAL (80% Delivery) COMMITTED (100% Delivery) Metrics on delivery of top priority items for the business (regular 6/12 week cadence to avoid drift) • Orthogonal innovation • Security program coordination metrics across multi disciplinary teams • Delivery of PoC artifact • Continual artifact creation across the security fabric • – Feature prototyping stretch goals – Process improvement stretch goals Bottom line: Poor OKRs are a waste of time for everyone. We need to answer the question, ‘Who cares?’ 12 OKRs: What We Learned So Far #RSAC Differentiate between security commitments and aspirational OKRs Empathize with the target: internal or external customer focus and how they interact with security Set clear milestones for both speed and security Security stretch goals should focus on innovation Close the security objective only when underlying key results are met 13 Team Leads Drive Balanced Development Practices We handle security tasks at the Dev level through Team Leads as Security Champions Product owners focus on features and do not inject security into the pipeline Dev team uses balanced automation to identify all security tasks and requirements relating to develo

pdf文档 2020_USA20_PS-F02_01_Integrating Our DevSecOps Product Pipeline with Software Security Standards

安全研究库 > 国外研究报告 > 产品安全性 > 文档预览
19 页 0 下载 37 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2020_USA20_PS-F02_01_Integrating Our DevSecOps Product Pipeline with Software Security Standards 第 1 页 2020_USA20_PS-F02_01_Integrating Our DevSecOps Product Pipeline with Software Security Standards 第 2 页 2020_USA20_PS-F02_01_Integrating Our DevSecOps Product Pipeline with Software Security Standards 第 3 页 2020_USA20_PS-F02_01_Integrating Our DevSecOps Product Pipeline with Software Security Standards 第 4 页 2020_USA20_PS-F02_01_Integrating Our DevSecOps Product Pipeline with Software Security Standards 第 5 页
下载文档到电脑,方便使用
还有 14 页可预览,继续阅读
本文档由 张玉竹2022-04-08 09:37:04上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言