SlideShare a Scribd company logo
1 of 27
Delivering Security
In an Agile World
7 things to remember to ensure
the software you’re developing is secure.
Imagine you’re running a shipping business…
To explain how to best fit security into your Agile
development process without slowing down the works, let’s
compare it to a shipping service.
So, instead of delivering software, imagine you’re now
delivering packages—really important packages.
Get your priorities straight.
Each package represents a feature that
someone wants in your software. Some are
very important and must be delivered ASAP.
Others can wait for a future delivery.
Keep on keepin’ on.
A driver that delivers packages to the right
addresses, on time, without losing them or
breaking them is like a software development
team that delivers a well-defined set of features
by the pre-determined release date. To keep to
the schedule, change things as you go rather
than back tracking.
Don’t cram the van, man.
When selecting what items to deliver each day,
it’s important to remember that the van can only
carry so much stuff at a time. Likewise, Agile
development teams have a notion of “how big
the van is.”
A sprint is no more stretchable than
the sides of a delivery van.
If all your eggs don’t fit in one
basket…
If someone orders a dozen eggs, but you can
only fit ten in the van, take ten now and two
later. Likewise, if a feature is too big for a sprint,
break it up into several sprints.
You can’t deliver half an egg (without
getting really messy). Likewise, there
are limits to how some features can
be broken down.
Handle with care.
Taking the time to fill the empty space in each
box with packing peanuts is worth the extra
effort. It’ll save you the cost and time it takes to
replace a broken item. Likewise, building
security into your SDLC will reduce the time and
money it takes to implement corrections in
future sprints.
The accumulation of replacement
items that need to be delivered is
called “technical debt.”
When life give you golf balls…
Giving your development team a code scanning
report with 25,000 results is like giving them
a crate of 25,000 golf balls and asking them
to ship each one individually.
It’s absurdly inefficient.
Security issues should be packaged
in a way that makes it easier for
developers to deliver.
Put the pedal to the metal.
Here are 3 tips to help you
deliver security successfully in an
Agile world.
Security needs to meet the developers
where they work.
1
Provide security assessment results in a format
that is consumable by the development team.
Agile software development methods work.
2
If you put security on your development team’s
list of goals, then they will build things that get
them to security.
The goal is to create secure software.
3
There is no need to make security artifacts for
the sake of making security artifacts.
Ready to get moving?
FIND OUT HOW

More Related Content

Viewers also liked

Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel BlancaEnfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Álvaro Miguel Carranza Montalvo
 
Ken Oldenburger CV 2017 Jan
Ken Oldenburger CV 2017 JanKen Oldenburger CV 2017 Jan
Ken Oldenburger CV 2017 Jan
Ken Oldenburger
 
CYI Submission to Inquiry into Foetal Alcohol Spectrum Disorder
CYI Submission to Inquiry into Foetal Alcohol Spectrum DisorderCYI Submission to Inquiry into Foetal Alcohol Spectrum Disorder
CYI Submission to Inquiry into Foetal Alcohol Spectrum Disorder
Gudmundur (Gummi) Fridriksson
 
Appleton_Pamela_Resume 6
Appleton_Pamela_Resume 6Appleton_Pamela_Resume 6
Appleton_Pamela_Resume 6
Pamela Appleton
 

Viewers also liked (14)

SSE
SSESSE
SSE
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel BlancaEnfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
Enfoque Crítico de la Educación, Educación, Bolivia, Piel Blanca
 
Ken Oldenburger CV 2017 Jan
Ken Oldenburger CV 2017 JanKen Oldenburger CV 2017 Jan
Ken Oldenburger CV 2017 Jan
 
CYI Submission to Inquiry into Foetal Alcohol Spectrum Disorder
CYI Submission to Inquiry into Foetal Alcohol Spectrum DisorderCYI Submission to Inquiry into Foetal Alcohol Spectrum Disorder
CYI Submission to Inquiry into Foetal Alcohol Spectrum Disorder
 
LeeBond2015
LeeBond2015LeeBond2015
LeeBond2015
 
YHON JAIRO DURAN M
YHON JAIRO DURAN MYHON JAIRO DURAN M
YHON JAIRO DURAN M
 
Co-production in Safeguarding Children
Co-production in Safeguarding ChildrenCo-production in Safeguarding Children
Co-production in Safeguarding Children
 
план работы цбс на 4 квартал 2015
план работы  цбс на 4 квартал 2015план работы  цбс на 4 квартал 2015
план работы цбс на 4 квартал 2015
 
Parenting:risk,capacity,and change under new lenses
Parenting:risk,capacity,and change under new lensesParenting:risk,capacity,and change under new lenses
Parenting:risk,capacity,and change under new lenses
 
Connecting Evidence to Outcomes: Practioner Development Programme
Connecting Evidence to Outcomes: Practioner Development ProgrammeConnecting Evidence to Outcomes: Practioner Development Programme
Connecting Evidence to Outcomes: Practioner Development Programme
 
Appleton_Pamela_Resume 6
Appleton_Pamela_Resume 6Appleton_Pamela_Resume 6
Appleton_Pamela_Resume 6
 
Child welfare workers' experiences of obstacles in care order case preparation
Child welfare workers' experiences of obstacles in care order case preparationChild welfare workers' experiences of obstacles in care order case preparation
Child welfare workers' experiences of obstacles in care order case preparation
 
GlobalTech brochure
GlobalTech brochureGlobalTech brochure
GlobalTech brochure
 

More from Cigital

BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
Cigital
 

More from Cigital (17)

7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin?
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The Numbers
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 

Recently uploaded

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Recently uploaded (20)

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 

Delivering Security In an Agile World

  • 1. Delivering Security In an Agile World 7 things to remember to ensure the software you’re developing is secure.
  • 2. Imagine you’re running a shipping business… To explain how to best fit security into your Agile development process without slowing down the works, let’s compare it to a shipping service. So, instead of delivering software, imagine you’re now delivering packages—really important packages.
  • 4. Each package represents a feature that someone wants in your software. Some are very important and must be delivered ASAP. Others can wait for a future delivery.
  • 6. A driver that delivers packages to the right addresses, on time, without losing them or breaking them is like a software development team that delivers a well-defined set of features by the pre-determined release date. To keep to the schedule, change things as you go rather than back tracking.
  • 7. Don’t cram the van, man.
  • 8. When selecting what items to deliver each day, it’s important to remember that the van can only carry so much stuff at a time. Likewise, Agile development teams have a notion of “how big the van is.”
  • 9. A sprint is no more stretchable than the sides of a delivery van.
  • 10. If all your eggs don’t fit in one basket…
  • 11. If someone orders a dozen eggs, but you can only fit ten in the van, take ten now and two later. Likewise, if a feature is too big for a sprint, break it up into several sprints.
  • 12. You can’t deliver half an egg (without getting really messy). Likewise, there are limits to how some features can be broken down.
  • 14. Taking the time to fill the empty space in each box with packing peanuts is worth the extra effort. It’ll save you the cost and time it takes to replace a broken item. Likewise, building security into your SDLC will reduce the time and money it takes to implement corrections in future sprints.
  • 15. The accumulation of replacement items that need to be delivered is called “technical debt.”
  • 16. When life give you golf balls…
  • 17. Giving your development team a code scanning report with 25,000 results is like giving them a crate of 25,000 golf balls and asking them to ship each one individually. It’s absurdly inefficient.
  • 18. Security issues should be packaged in a way that makes it easier for developers to deliver.
  • 19. Put the pedal to the metal.
  • 20. Here are 3 tips to help you deliver security successfully in an Agile world.
  • 21. Security needs to meet the developers where they work. 1
  • 22. Provide security assessment results in a format that is consumable by the development team.
  • 23. Agile software development methods work. 2
  • 24. If you put security on your development team’s list of goals, then they will build things that get them to security.
  • 25. The goal is to create secure software. 3
  • 26. There is no need to make security artifacts for the sake of making security artifacts.
  • 27. Ready to get moving? FIND OUT HOW