Home
Explore
Submit Search
Upload
Login
Signup
1112 agile approach to pci dss development
Report
bezpiecznik
Follow
Dec. 15, 2011
•
0 likes
•
3,575 views
1
of
24
1112 agile approach to pci dss development
Dec. 15, 2011
•
0 likes
•
3,575 views
Report
Business
Technology
Combination Agile SDLC methodologies and PCI DSS
bezpiecznik
Follow
Recommended
Secure your Java EE projects by using JOnAS Java EE server audit & diagnostic...
Florent BENOIT
671 views
•
38 slides
Finance function and dss
sagheerue
1.1K views
•
15 slides
Agile Process Audit
Xebia IT Architects
4.8K views
•
14 slides
Popular Pitfalls In Sdlc Phases 1
Ramkumar Ramachandran
3K views
•
35 slides
Introdução Linux
Ivani Nascimento
1.9K views
•
22 slides
Minicurso Samba
Ivani Nascimento
5.5K views
•
59 slides
More Related Content
Similar to 1112 agile approach to pci dss development
SOA OSB BPEL BPM Presentation
Liviu Claudiu Cismaru
4.9K views
•
51 slides
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
Itris Automation Square
1.6K views
•
36 slides
Getting Started with DevOps
IBM UrbanCode Products
2.4K views
•
31 slides
Sriram simplify os_sdevelopment
suniltomar04
321 views
•
24 slides
Sriram simplify os_sdevelopment
OpenSourceIndia
468 views
•
24 slides
A Decade of SharePoint Adoption Strategies
Chris McNulty
474 views
•
30 slides
Similar to 1112 agile approach to pci dss development
(20)
SOA OSB BPEL BPM Presentation
Liviu Claudiu Cismaru
•
4.9K views
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
Itris Automation Square
•
1.6K views
Getting Started with DevOps
IBM UrbanCode Products
•
2.4K views
Sriram simplify os_sdevelopment
suniltomar04
•
321 views
Sriram simplify os_sdevelopment
OpenSourceIndia
•
468 views
A Decade of SharePoint Adoption Strategies
Chris McNulty
•
474 views
Analysis process designer (apd) part 2
dejavee
•
3.2K views
A short introduction to the cloud
Laurent Eschenauer
•
1K views
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Internap
•
264 views
Ubiquisys at Femtocells Americas 11
Ubiquisys Small Cells
•
677 views
The Application Development Landscape - 2011
David Skok
•
14.4K views
Colaboración - la Nueva Plataforma para los Negocios
Mundo Contact
•
270 views
Use case+2-0
MikeSorokin
•
9.9K views
Analysis process designer (apd) part 1
dejavee
•
5.7K views
Erp b
amitcdesai
•
285 views
Vikas swarankar portfolio_25_oct_2011
Rakesh Ranjan
•
284 views
Divyanshu open stack presentation -osi-ppt
OpenSourceIndia
•
912 views
Divyanshu open stack presentation -osi-ppt
suniltomar04
•
445 views
Hacker tooltalk: Social Engineering Toolkit (SET)
Chris Hammond-Thrasher
•
6.6K views
Overview of AIS e-ManagedSecurity
AISDC
•
293 views
Recently uploaded
Sage Intacct R3 Release 2023
Withum
21 views
•
74 slides
U.S. Hiring Trends Across Professional Fields - Q3/Q4 2023
Robert Half
27 views
•
10 slides
Basiq - Consumer Affordability Sample Report.pdf
AlexMcManus9
14 views
•
21 slides
KLAUS MULTIPARKING: A SMART PARKING SOLUTION
Klaus India
11 views
•
5 slides
GSM FCT - Telephone Call Recorder
Nirmal Sharma
15 views
•
1 slide
LPS_compressed.pdf
ManinderK5
43 views
•
15 slides
Recently uploaded
(20)
Sage Intacct R3 Release 2023
Withum
•
21 views
U.S. Hiring Trends Across Professional Fields - Q3/Q4 2023
Robert Half
•
27 views
Basiq - Consumer Affordability Sample Report.pdf
AlexMcManus9
•
14 views
KLAUS MULTIPARKING: A SMART PARKING SOLUTION
Klaus India
•
11 views
GSM FCT - Telephone Call Recorder
Nirmal Sharma
•
15 views
LPS_compressed.pdf
ManinderK5
•
43 views
Customer-Centricity
Operational Excellence Consulting (Singapore)
•
23 views
Unforgettable Events.pdf
Bloomerang
•
223 views
Sherry Quam Taylor _ August 2023.pdf
Bloomerang
•
316 views
HR_Project_Report_on_training_and_development.pdf
DeepshikhaKerketta
•
10 views
seo presentation.pdf
Armaanchuchra
•
25 views
SolyPlus Pitch Deck for investors & partners August 2023
SolyPlus GmbH
•
17 views
The BIG SECRET ABOUT FUNDRAISING White Paper _ Sherry Quam Taylor.pdf
Bloomerang
•
327 views
NewBase 24 August 2023 Energy News issue - 1650 by Khaled Al Awadi_compresse...
Khaled Al Awadi
•
18 views
Ocean Safety Supplies - Spill Containment Pallets in Singapore.pptx
OceanSafetySupplies1
•
13 views
How eInvoice QR Code is Becoming a Standard – Know Advantages and Applicability
TaxPro3
•
9 views
roland_berger_trend_compendium_2050_compact_version.pdf
Chris Skinner
•
98 views
WHAT IS THE TRADE BETWEEN TURKEY AND AUSTRALIA.pdf
TradeImex Info Solution
•
18 views
Pitch Deck Teardown: BusRight's $7M Series A deck
HajeJanKamps
•
416 views
2023-07 Business of Agile Coaching - FINAL.pdf
John Eisenschmidt
•
23 views
1112 agile approach to pci dss development
The agile approach
to PCI DSS implementation in SDLC area Jakub Syta, CISA, CISSP, CRISC Warszawa 15 grudnia 2011 © 2011 IMMUSEC Sp. z o.o. 1
Adapted from Mike
Cohn presentation:„Introduction to scrum” mike@mountaingoatsoftware.com Project noise level Source: Strategic Management and Organizational Dynamics by Ralph Stacey in Agile Software Development with Scrum by Ken Schwaber and Mike Beedle. © 2011 IMMUSEC Sp. z o.o. 2
Adapted from Mike
Cohn presentation:„Introduction to scrum” mike@mountaingoatsoftware.com The Agile Manifesto – a statement of values Individuals and over Process and tools interactions Comprehensive Working software over documentation Customer over Contract negotiation collaboration Responding to over Following a plan change Source: www.agilemanifesto.org © 2011 IMMUSEC Sp. z o.o. 3
10 Key Principles
of Agile Development 1. Active User Involvement Is Imperative 2. Agile Development Teams Must Be Empowered 3. Time Waits For No Man! 4. Agile Requirements Are Barely Sufficient 5. How Do You Eat An Elephant? 6. Fast But Not So Furious 7. Done Means DONE! 8. Enough Is Enough! 9. Agile Testing Is Not For Dummies! 10. No Place For Snipers! http://www.allaboutagile.com © 2011 IMMUSEC Sp. z o.o. 4
Adapted from Mike
Cohn presentation:„Introduction to scrum” mike@mountaingoatsoftware.com Putting scrum all together Image available at www.mountaingoatsoftware.com/scrum © 2011 IMMUSEC Sp. z o.o. 5
Adapted from Mike
Cohn presentation:„Introduction to scrum” mike@mountaingoatsoftware.com Scrum framework Roles •Product owner •ScrumMaster •Team Ceremonies •Sprint planning •Sprint review •Sprint retrospective •Daily scrum meeting Artifacts •Product backlog •Sprint backlog •Burndown charts © 2011 IMMUSEC Sp. z o.o. 6
XP values
Simplicity Communication Feedback Respect Courage http://www.extremeprogramming.org/values.html © 2011 IMMUSEC Sp. z o.o. 7
XP pracitices © 2011
IMMUSEC Sp. z o.o. 8
PCI DSS requirements Build
and Maintain a Secure Network • Requirement 1: Install and maintain a firewall configuration to protect cardholder data • Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data • Requirement 3: Protect stored cardholder data • Requirement 4: Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program • Requirement 5: Use and regularly update anti-virus software or programs • Requirement 6: Develop and maintain secure systems and applications © 2011 IMMUSEC Sp. z o.o. 9
PCI DSS requirements Implement
Strong Access Control Measures • Requirement 7: Restrict access to cardholder data by business need to know • Requirement 8: Assign a unique ID to each person with computer access • Requirement 9: Restrict physical access to cardholder data Regularly Monitor and Test Networks • Requirement 10: Track and monitor all access to network resources and cardholder data • Requirement 11: Regularly test security systems and processes. Maintain an Information Security Policy • Requirement 12: Maintain a policy that addresses information security for all personnel. © 2011 IMMUSEC Sp. z o.o. 10
PCI DSS requirements
for the development process • 6.3 Develop software applications (internal and external, and including web-based administrative access to applications) in accordance with PCI DSS (for example, secure authentication and logging) and based on industry best practices. Incorporate information security throughout the software development life cycle. These processes must include the following: • 6.3.1 Removal of custom application accounts, user IDs, and passwords before applications become active or are released to customers. • 6.3.2 Review of custom code prior to release to production or customers in order to identify any potential coding vulnerability. © 2011 IMMUSEC Sp. z o.o. 11
Change control process •
6.4 Follow change control processes and procedures for all changes to system components. The processes must include the following: • 6.4.1 Separate development/test and production environments. • 6.4.2 Separation of duties between development/test and production environments. • 6.4.3 Production data (live PANs) are not used for testing or development. • 6.4.4 Removal of test data and accounts before production systems become active. © 2011 IMMUSEC Sp. z o.o. 12
Change control process •
6.4.5 Change control procedures for the implementation of security patches and software modifications. Procedures must include the following: • 6.4.5.1 Documentation of impact. • 6.4.5.2 Documented change approval by authorized parties. • 6.4.5.3 Functionality testing to verify that the change does not adversely impact the security of the system. • 6.4.5.4 Back-out procedures. © 2011 IMMUSEC Sp. z o.o. 13
Basic assumptions •
Restrictions of PAN processing • Ensuring safe work environment • Usage of trusted software • Logging and monitoring • Safekeeping of cryptographic material • Formal change management and acceptance testing • Security policy and user awareness • Physical security • Accurate and updated documentation © 2011 IMMUSEC Sp. z o.o. 14
Safe work environment •
Hardened accordingly to formally accepted standards, for example – Center for Internet Security (CIS) – International Organization for Standardization (ISO) – SysAdmin Audit Network Security (SANS) Institute – National Institute of Standards Technology (NIST) • Protected networks, separated from insecure environments (including WLAN) • Only one primary function per server, protected integrity of key files • Secured workstations • Separate development/test/production environments • Penetration tests done accordingly to best practices (OWASP Guide, SANS CWE Top 25, CERT Secure Coding) • Quarterly vulnerability scans © 2011 IMMUSEC Sp. z o.o. 15
IMPLEMENTATION
© 2011 IMMUSEC Sp. z o.o. 16
Segregation of IT
environmnets Development Test Production Solely for development and Purposed for formal Purposed for maintaining initial testing purposes application testing purposes production systems and application No CHD No CHD CHD present but strictly controlled © 2011 IMMUSEC Sp. z o.o. 17
Documentation 1.
D1 User story 2. D2 Release backlog 3. D3 Project sheet 4. D4 Sprint backlog © 2011 IMMUSEC Sp. z o.o. 18
SDLC major roles 1.
Product Owner 8. Programmer 2. Client 9. Tester 3. Scrum Master 10. Migration specialist 4. Project Manager 11. System admin 5. Head of Development 12. Database admin 6. Architect 13. Network admin 7. Analyst 14. Security officer © 2011 IMMUSEC Sp. z o.o. 19
SDLC phases
• Presentation of clients idea of needed development tasks and initial Initiation analysis • Identfication of workload and identyfication of non-development tasks Planning required to complete the task • Developing accordingly to PCI DSS requirements, documentation, tests Developent (plus daily scrum, retrospective meetings) • Preparation for the implementation phase, definition of done Implementa- tion © 2011 IMMUSEC Sp. z o.o. 20
Definition of Done •
Finished code • Commented code • Independent code review • Unit tests completed • Integration tests completed • Version infomation prepared • Documentation prepared/updated • Risks were identified and managed appropriately • … © 2011 IMMUSEC Sp. z o.o. 21
Secure coding guidiance •
6.5.1 Injection flaws, particularly SQL injection. Also consider OS Command Injection, LDAP and XPath injection flaws as well as other injection flaws. • 6.5.2 Buffer overflow • 6.5.3 Insecure cryptographic storage • 6.5.4 Insecure communications • 6.5.5 Improper error handling • 6.5.6 All “High” vulnerabilities identified in the vulnerability identification process (as defined in PCI DSS Requirement 6.2). • 6.5.7 Cross-site scripting (XSS) • 6.5.8 Improper Access Control (such as insecure direct object references, failure to restrict URL access, and directory traversal) • 6.5.9 Cross-site request forgery (CSRF) • Note: The vulnerabilities listed at 6.5.1 through 6.5.9 were current with industry best practices when this version of PCI DSS was published. However, as industry best practices for vulnerability management are updated (for example, the OWASP Guide, SANS CWE Top 25, CERT Secure Coding, etc.), the current best practices must be used for these requirements. © 2011 IMMUSEC Sp. z o.o. 22
Conclusions Benefits • Isn’t that
difficult as it may seam • Developers do what is really needed, business sees progress in key areas, relationships are established • Business takes responsibility about priorities • Formal frameworks do exist but does not limit anyone • Consider process as ally not an enemy • Creative approach to paperwork • Business first (with security included) © 2011 IMMUSEC Sp. z o.o. 23
IMMUSEC Sp. z
o.o. Knowledge Village ul. Wiertnicza 141 02-952 Warszawa-Wilanów Tel. +48 22 3797470 Fax. +48 22 3797479 email: biuro@immusec.com 24 © 2011 IMMUSEC Sp. z o.o.