SlideShare a Scribd company logo
How to balance
between Security and
Agile Development
Regional Scrum Gathering Tokyo 2021
Makoto IGUCHI (Kii Corporation)
The relationship between security and agile
development… It’s got to be good, right?
In reality…
• Will security put the brakes on DevOps and agile
development (2016.12.26)
https://www.atmarkit.co.jp/ait/articles/1612/19/news128.html
Today’s talk
1. A small trick to achieve a good relationship
between security and agile development
 “Absolute” vs. “Relative” thinking
2. Experiment for building a good relationship
@ my workplace
 “Shift left” using a card game
 Rethinking the “value” of security tasks
Self Introduction
• Makoto Iguchi@
https://jp.kii.com/
• Scrum Master
• Security Architect  Responsible for doing everything
possible to improve the security of the product
• Head of ISMS Internal auditors
A company developing and
operating a cloud service for
IoT platform and solutions.
A small trick to achieve a good
relationship between Security
and Agile Development
How is it in your workplace?
Relationship between security and development in
your workplace is:
1. Excellent
2. Good
3. Fair
4. Poor
A developer’s tweet…
From Japan Information Security Audit
Association
Result of the survey released on 2020/1/6
https://www.jasa.jp/seminar/sec_trend2020/
Better
Product
Adding
valuable
features
Improving security
(reducing vulnerabilities)
What’s wrong here?
Example) Checklists, such as Information Security
Management/Audit Standards
… all-too-common model of security as a team, which
sits and snipes at the people who actually build things,
telling them no and pointing fingers, is in fact
fantastically counterproductive.
--- Your Security team is probably an infuriating obstacle
– but it doesn’t have to be this way (TechCrunch
2019/8/8)
Make sure to pass all the
checklist items!
Pass all “high” priority items,
or no release is allowed!
Is the checklist absolute??
The checklist should
be followed blindly…
It should be utilized relative
to the current situation
 対応を要する項目の発
見と取捨選択
of course not!
Actual example
Information Security Management Standards
(rev. 2016) by Ministry of Economy, Trade and Industry
「II 本管理基準の位置づけ」に以下の記載
本管理基準は、組織体における情報セキュリティマネジメントの円滑
で効果的な確立を目指して、マネジメントサイクル構築の出発点から
具体的な管理策に至るまで、包括的な適用範囲を有する基準となって
いる。当然のことではあるが、組織体が属する業界又は事業活動の特
性等を考慮し、必要に応じて本管理基準の趣旨及び体系に則って、本
管理基準の項目等を取捨選択、追加又は統合することにより、該当す
る関係機関において独自の管理基準を策定し活用することが望ましい。
https://www.meti.go.jp/policy/netsecurity/downloadfiles/IS_Management_Standard_H28.pdf
Trick to build a good relationship
“Absolute” thinking “Relative“ thinking
Man-month estimate Story point estimate
Fixed spec and schedule
Priority and schedule
refinement per sprint
WHY DON’T
YOU BECOME
A DEMON?
RELATIVE-
THINKER?
Experiment for building a
good relationship
Experiment @ my workplace
Sprint backlog
Product backlog
脅
威
Realizing “shift left”
using a card game
Properly loading security tasks onto
the sprint backlog
スプリントバックログ
プロダクトバックログ
セキュリティタスクを正しく
スプリントバックログに積む工夫
脅
威
Realizing “shift left”
using a card game
Shift-left security
Designing Implementing Operating/maintaining
HERE
STRIDE Threat Analysis
• Spoofing
• Tampering
• Repudiation
• Information Disclosure
• Denial of Service
• Elevation of Privilege
A good reference on threat analysis →
STRIDE card game (EoP card game)
The Elevation of Privilege Threat Modeling Card Deck
https://github.com/adamshostack/eop
Japanese version 
EoP脅威モデリングカードゲーム https://bit.ly/eop-ja
プロダクトバックログ
脅
威
カードゲームを使った
シフトレフトの実現
Sprint backlog
Properly loading security tasks onto
the sprint backlog
This is quite difficult…
Security is difficult with agile methods
(2018.12.13)
https://japan.zdnet.com/article/35130079/
The problem of putting off security tasks
Piling up items to maximize values
What is Agile? by Henrik Kniberg
脅
威
Does it mean that security tasks
do not contribute to adding values
to the product?
Rethinking security tasks
Security Task
Tasks for fixing product weaknesses (vulnerabilities)
that are found through threat analysis
• Vulnerabilities continue to exist until the task is
completed
• Vulnerabilities disappear when the task is completed
Let’s think vulnerability as a bomb
Even if there is a bomb in the
product, it does not affect the
value of the product as long
as it does not explode.
Once it explodes, the
value of the product is
brown away completely.
Security task and product value
Task for dismantling bomb in the product
• The task itself does not increase the product value
• The task prevents bombs from exploding and
destroying the product value
Sprint Planing
Sprint backlog
Product backlog
脅
威
Bomb dismantling backlog
Load implementation
tasks to efficiently
increase product value
Load dangerous items
that are about to explode
to avoid them from
blowing up product value
「ときメ○」モデル
女の子からの評価
スクラム アジャ子
インプリ セキュ実
好雄 「こんなとこだな。
爆発しない限り価値=好感度
に影響を及ぼさないが、爆発
すると今まで積んだ好感度が
吹っ飛んでしまう。
 適宜爆弾処理が必要
価値=好感度を上げる
ために効率よく実装
タスクをこなしていく
MVP (Minimum Viable Product)
with MBP (Manageable Bomb Placement)
What is Agile? by Henrik Kniberg
Spotting dangerous bombs relatively
As with product backlog, the bomb dismantling backlog need to
be refined on a regular basis to load the appropriate security
tasks on time
e.g., Vulnerability = “No Brake”
Not dangerous Getting
dangerous
Completely
out of control
“Too much bomb” case: Zoom
A Message to Our Users (April 1, 2020)
https://blog.zoom.us/a-message-to-our-users/
• Suspended new feature development for 90 days
• Focused on solving security/privacy issues
Balancing security and agile
development is possible!
You can do it!

More Related Content

What's hot

Kintone 導入サービス キャンペーン_20140903-1
Kintone 導入サービス キャンペーン_20140903-1Kintone 導入サービス キャンペーン_20140903-1
Kintone 導入サービス キャンペーン_20140903-1denet_tech_tokyo
 
【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法
【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法
【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法devsumi2009
 
FPGAによるホームサービスロボットのための組込脳型計算機システム
FPGAによるホームサービスロボットのための組込脳型計算機システムFPGAによるホームサービスロボットのための組込脳型計算機システム
FPGAによるホームサービスロボットのための組込脳型計算機システム
直久 住川
 
I show u settings_jp_focusrite
I show u settings_jp_focusriteI show u settings_jp_focusrite
I show u settings_jp_focusrite
LucaDaCol1
 
Cloud Computing - クラウドコンピューティング(会津産学懇話会)
Cloud Computing - クラウドコンピューティング(会津産学懇話会)Cloud Computing - クラウドコンピューティング(会津産学懇話会)
Cloud Computing - クラウドコンピューティング(会津産学懇話会)
Yusuke Kawasaki
 
CSS Nite In Ginza, Vol.36
CSS Nite In Ginza, Vol.36CSS Nite In Ginza, Vol.36
CSS Nite In Ginza, Vol.36
Nobuya Sato
 
Search Engines Chapter 1 Summary
Search Engines Chapter 1 SummarySearch Engines Chapter 1 Summary
Search Engines Chapter 1 Summary
sleepy_yoshi
 
文献紹介:Semantic-based information retrieval in support of concept design.
文献紹介:Semantic-based information retrieval in support of concept design.文献紹介:Semantic-based information retrieval in support of concept design.
文献紹介:Semantic-based information retrieval in support of concept design.
Shin Sano
 
【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」
【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」
【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」devsumi2009
 
【12-C-5】 自律型移動ロボットのソフトウェア技術
【12-C-5】 自律型移動ロボットのソフトウェア技術【12-C-5】 自律型移動ロボットのソフトウェア技術
【12-C-5】 自律型移動ロボットのソフトウェア技術devsumi2009
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
taiwanweb20
 
Seasar Conference2008 Grails(Final)
Seasar Conference2008 Grails(Final)Seasar Conference2008 Grails(Final)
Seasar Conference2008 Grails(Final)Uehara Junji
 
S30
S30S30
20210119 io t lt atom hub
20210119 io t lt atom hub20210119 io t lt atom hub
20210119 io t lt atom hub
ShigekiInatama
 
数字から読む信号機の傾向と精度2020
数字から読む信号機の傾向と精度2020数字から読む信号機の傾向と精度2020
数字から読む信号機の傾向と精度2020
Jun Sasaki
 
マッシュアップ×エンタープライズ開発 (XDev 2008)
マッシュアップ×エンタープライズ開発 (XDev 2008)マッシュアップ×エンタープライズ開発 (XDev 2008)
マッシュアップ×エンタープライズ開発 (XDev 2008)
Yusuke Kawasaki
 
Что такое ASP.NET MVC?
Что такое ASP.NET MVC?Что такое ASP.NET MVC?
Что такое ASP.NET MVC?
Dima Pasko
 
Road To Major(?)
Road To Major(?)Road To Major(?)
Road To Major(?)
Takeshi Kakeda
 
LT openpear@LL温泉
LT openpear@LL温泉LT openpear@LL温泉
LT openpear@LL温泉
Sotaro Karasawa
 

What's hot (19)

Kintone 導入サービス キャンペーン_20140903-1
Kintone 導入サービス キャンペーン_20140903-1Kintone 導入サービス キャンペーン_20140903-1
Kintone 導入サービス キャンペーン_20140903-1
 
【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法
【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法
【12-D-6】 Silverlight によるハイグレードなLOB/BI実現のためのコンポーネント活用法
 
FPGAによるホームサービスロボットのための組込脳型計算機システム
FPGAによるホームサービスロボットのための組込脳型計算機システムFPGAによるホームサービスロボットのための組込脳型計算機システム
FPGAによるホームサービスロボットのための組込脳型計算機システム
 
I show u settings_jp_focusrite
I show u settings_jp_focusriteI show u settings_jp_focusrite
I show u settings_jp_focusrite
 
Cloud Computing - クラウドコンピューティング(会津産学懇話会)
Cloud Computing - クラウドコンピューティング(会津産学懇話会)Cloud Computing - クラウドコンピューティング(会津産学懇話会)
Cloud Computing - クラウドコンピューティング(会津産学懇話会)
 
CSS Nite In Ginza, Vol.36
CSS Nite In Ginza, Vol.36CSS Nite In Ginza, Vol.36
CSS Nite In Ginza, Vol.36
 
Search Engines Chapter 1 Summary
Search Engines Chapter 1 SummarySearch Engines Chapter 1 Summary
Search Engines Chapter 1 Summary
 
文献紹介:Semantic-based information retrieval in support of concept design.
文献紹介:Semantic-based information retrieval in support of concept design.文献紹介:Semantic-based information retrieval in support of concept design.
文献紹介:Semantic-based information retrieval in support of concept design.
 
【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」
【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」
【13-C-4】 「もう業務はとまらない!オフライン機能を使った業務アプリケーションの実例と最新 Curl 情報」
 
【12-C-5】 自律型移動ロボットのソフトウェア技術
【12-C-5】 自律型移動ロボットのソフトウェア技術【12-C-5】 自律型移動ロボットのソフトウェア技術
【12-C-5】 自律型移動ロボットのソフトウェア技術
 
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
創業家研習營-7分鐘創意簡報技巧,Mr.6劉威麟
 
Seasar Conference2008 Grails(Final)
Seasar Conference2008 Grails(Final)Seasar Conference2008 Grails(Final)
Seasar Conference2008 Grails(Final)
 
S30
S30S30
S30
 
20210119 io t lt atom hub
20210119 io t lt atom hub20210119 io t lt atom hub
20210119 io t lt atom hub
 
数字から読む信号機の傾向と精度2020
数字から読む信号機の傾向と精度2020数字から読む信号機の傾向と精度2020
数字から読む信号機の傾向と精度2020
 
マッシュアップ×エンタープライズ開発 (XDev 2008)
マッシュアップ×エンタープライズ開発 (XDev 2008)マッシュアップ×エンタープライズ開発 (XDev 2008)
マッシュアップ×エンタープライズ開発 (XDev 2008)
 
Что такое ASP.NET MVC?
Что такое ASP.NET MVC?Что такое ASP.NET MVC?
Что такое ASP.NET MVC?
 
Road To Major(?)
Road To Major(?)Road To Major(?)
Road To Major(?)
 
LT openpear@LL温泉
LT openpear@LL温泉LT openpear@LL温泉
LT openpear@LL温泉
 

Similar to How to balance between Security and Agile Development

좌충우돌 디지털트윈 구축기
좌충우돌 디지털트윈 구축기좌충우돌 디지털트윈 구축기
좌충우돌 디지털트윈 구축기
SANGHEE SHIN
 
Yakiniku(焼き肉) on the Cloud
Yakiniku(焼き肉) on the CloudYakiniku(焼き肉) on the Cloud
Yakiniku(焼き肉) on the Cloud
Takao Funami
 
Hr 045 職場經驗分享2
Hr 045 職場經驗分享2Hr 045 職場經驗分享2
Hr 045 職場經驗分享2handbook
 
UAI seminor at nagoya 20080515
UAI seminor at nagoya 20080515UAI seminor at nagoya 20080515
UAI seminor at nagoya 20080515Masahiro Umegaki
 
Vsug Leaders Summit 2008:A.Fukui
Vsug Leaders Summit 2008:A.FukuiVsug Leaders Summit 2008:A.Fukui
Vsug Leaders Summit 2008:A.Fukui
Atsushi Fukui
 
A Matrixed Approach to Designing IT Governance
A Matrixed Approach to Designing IT GovernanceA Matrixed Approach to Designing IT Governance
A Matrixed Approach to Designing IT Governance
Sangmin Cha
 
커리어특강자료_글로벌커리어 및 인공지능 커리어
커리어특강자료_글로벌커리어 및 인공지능 커리어커리어특강자료_글로벌커리어 및 인공지능 커리어
커리어특강자료_글로벌커리어 및 인공지능 커리어
IBM HongKong
 
Silent Running Side C
Silent Running Side CSilent Running Side C
Silent Running Side C
Shunsaku Kudo
 
How To Build A Website And Stay Sane
How To Build A Website And Stay SaneHow To Build A Website And Stay Sane
How To Build A Website And Stay Sane
Jonathan Oxer
 
Blockchain sharding
Blockchain shardingBlockchain sharding
Blockchain sharding
제호 송
 
Design Myths in Enterprise Software
Design Myths in Enterprise SoftwareDesign Myths in Enterprise Software
Design Myths in Enterprise Software
Ganesh Burle
 
Oracle Cloudで実現できる High Performance Computing 最新情報
Oracle Cloudで実現できる High Performance Computing 最新情報Oracle Cloudで実現できる High Performance Computing 最新情報
Oracle Cloudで実現できる High Performance Computing 最新情報
オラクルエンジニア通信
 
“從A到a+”在研華的體會與實踐
“從A到a+”在研華的體會與實踐“從A到a+”在研華的體會與實踐
“從A到a+”在研華的體會與實踐evaread
 
S is for Spec
S is for SpecS is for Spec
S is for Spec
Shintaro Kakutani
 
12.2008 Trendbird Monthly Trend Report Sample
12.2008 Trendbird  Monthly Trend Report Sample12.2008 Trendbird  Monthly Trend Report Sample
12.2008 Trendbird Monthly Trend Report Samplewebtel125
 
20 Ideas On How To Improve Your Agile Board
20 Ideas On How To Improve Your Agile Board20 Ideas On How To Improve Your Agile Board
20 Ideas On How To Improve Your Agile Board
Marcus Hammarberg
 
Linuxユーザーのための Windows 管理入門
Linuxユーザーのための Windows 管理入門Linuxユーザーのための Windows 管理入門
Linuxユーザーのための Windows 管理入門
shigeya
 
Migrating off legacy platforms while still delivering value - DNA & SAFe AU...
Migrating off legacy platforms while still delivering value -   DNA & SAFe AU...Migrating off legacy platforms while still delivering value -   DNA & SAFe AU...
Migrating off legacy platforms while still delivering value - DNA & SAFe AU...
Em Campbell-Pretty
 

Similar to How to balance between Security and Agile Development (20)

좌충우돌 디지털트윈 구축기
좌충우돌 디지털트윈 구축기좌충우돌 디지털트윈 구축기
좌충우돌 디지털트윈 구축기
 
Yakiniku(焼き肉) on the Cloud
Yakiniku(焼き肉) on the CloudYakiniku(焼き肉) on the Cloud
Yakiniku(焼き肉) on the Cloud
 
Hr 045 職場經驗分享2
Hr 045 職場經驗分享2Hr 045 職場經驗分享2
Hr 045 職場經驗分享2
 
IA & UCD/UXD
IA & UCD/UXDIA & UCD/UXD
IA & UCD/UXD
 
UAI seminor at nagoya 20080515
UAI seminor at nagoya 20080515UAI seminor at nagoya 20080515
UAI seminor at nagoya 20080515
 
Vsug Leaders Summit 2008:A.Fukui
Vsug Leaders Summit 2008:A.FukuiVsug Leaders Summit 2008:A.Fukui
Vsug Leaders Summit 2008:A.Fukui
 
A Matrixed Approach to Designing IT Governance
A Matrixed Approach to Designing IT GovernanceA Matrixed Approach to Designing IT Governance
A Matrixed Approach to Designing IT Governance
 
커리어특강자료_글로벌커리어 및 인공지능 커리어
커리어특강자료_글로벌커리어 및 인공지능 커리어커리어특강자료_글로벌커리어 및 인공지능 커리어
커리어특강자료_글로벌커리어 및 인공지능 커리어
 
Silent Running Side C
Silent Running Side CSilent Running Side C
Silent Running Side C
 
20081123-web2.0class
20081123-web2.0class20081123-web2.0class
20081123-web2.0class
 
How To Build A Website And Stay Sane
How To Build A Website And Stay SaneHow To Build A Website And Stay Sane
How To Build A Website And Stay Sane
 
Blockchain sharding
Blockchain shardingBlockchain sharding
Blockchain sharding
 
Design Myths in Enterprise Software
Design Myths in Enterprise SoftwareDesign Myths in Enterprise Software
Design Myths in Enterprise Software
 
Oracle Cloudで実現できる High Performance Computing 最新情報
Oracle Cloudで実現できる High Performance Computing 最新情報Oracle Cloudで実現できる High Performance Computing 最新情報
Oracle Cloudで実現できる High Performance Computing 最新情報
 
“從A到a+”在研華的體會與實踐
“從A到a+”在研華的體會與實踐“從A到a+”在研華的體會與實踐
“從A到a+”在研華的體會與實踐
 
S is for Spec
S is for SpecS is for Spec
S is for Spec
 
12.2008 Trendbird Monthly Trend Report Sample
12.2008 Trendbird  Monthly Trend Report Sample12.2008 Trendbird  Monthly Trend Report Sample
12.2008 Trendbird Monthly Trend Report Sample
 
20 Ideas On How To Improve Your Agile Board
20 Ideas On How To Improve Your Agile Board20 Ideas On How To Improve Your Agile Board
20 Ideas On How To Improve Your Agile Board
 
Linuxユーザーのための Windows 管理入門
Linuxユーザーのための Windows 管理入門Linuxユーザーのための Windows 管理入門
Linuxユーザーのための Windows 管理入門
 
Migrating off legacy platforms while still delivering value - DNA & SAFe AU...
Migrating off legacy platforms while still delivering value -   DNA & SAFe AU...Migrating off legacy platforms while still delivering value -   DNA & SAFe AU...
Migrating off legacy platforms while still delivering value - DNA & SAFe AU...
 

More from Makoto Iguchi

シフトレフトを頑張っていたらなぜかカードゲームができた話
シフトレフトを頑張っていたらなぜかカードゲームができた話シフトレフトを頑張っていたらなぜかカードゲームができた話
シフトレフトを頑張っていたらなぜかカードゲームができた話
Makoto Iguchi
 
The Privacy Policy Landscape After the GDPR from PETS2020
The Privacy Policy Landscape After the GDPR from PETS2020The Privacy Policy Landscape After the GDPR from PETS2020
The Privacy Policy Landscape After the GDPR from PETS2020
Makoto Iguchi
 
ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)
ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)
ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)
Makoto Iguchi
 
GDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ー
GDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ーGDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ー
GDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ー
Makoto Iguchi
 
「みもふたもない」〆切なんかに絶対負けない方法
「みもふたもない」〆切なんかに絶対負けない方法「みもふたもない」〆切なんかに絶対負けない方法
「みもふたもない」〆切なんかに絶対負けない方法
Makoto Iguchi
 
「みもふたもない」論文投稿必勝法
「みもふたもない」論文投稿必勝法「みもふたもない」論文投稿必勝法
「みもふたもない」論文投稿必勝法
Makoto Iguchi
 
分散開発チームによるAgile開発実践 ~いろいろハマった!よかった
分散開発チームによるAgile開発実践 ~いろいろハマった!よかった分散開発チームによるAgile開発実践 ~いろいろハマった!よかった
分散開発チームによるAgile開発実践 ~いろいろハマった!よかった
Makoto Iguchi
 

More from Makoto Iguchi (7)

シフトレフトを頑張っていたらなぜかカードゲームができた話
シフトレフトを頑張っていたらなぜかカードゲームができた話シフトレフトを頑張っていたらなぜかカードゲームができた話
シフトレフトを頑張っていたらなぜかカードゲームができた話
 
The Privacy Policy Landscape After the GDPR from PETS2020
The Privacy Policy Landscape After the GDPR from PETS2020The Privacy Policy Landscape After the GDPR from PETS2020
The Privacy Policy Landscape After the GDPR from PETS2020
 
ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)
ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)
ぜんぜんわからない…俺たちは雰囲気でリスクアセスメントをやっている(た)
 
GDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ー
GDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ーGDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ー
GDPRにおける日本の十分性認定が(ほぼ)採択された今だからこそ発表できるアレな話 ーそんな契約で大丈夫か?ー
 
「みもふたもない」〆切なんかに絶対負けない方法
「みもふたもない」〆切なんかに絶対負けない方法「みもふたもない」〆切なんかに絶対負けない方法
「みもふたもない」〆切なんかに絶対負けない方法
 
「みもふたもない」論文投稿必勝法
「みもふたもない」論文投稿必勝法「みもふたもない」論文投稿必勝法
「みもふたもない」論文投稿必勝法
 
分散開発チームによるAgile開発実践 ~いろいろハマった!よかった
分散開発チームによるAgile開発実践 ~いろいろハマった!よかった分散開発チームによるAgile開発実践 ~いろいろハマった!よかった
分散開発チームによるAgile開発実践 ~いろいろハマった!よかった
 

Recently uploaded

Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
abdulrafaychaudhry
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
vrstrong314
 

Recently uploaded (20)

Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)Introduction to Pygame (Lecture 7 Python Game Development)
Introduction to Pygame (Lecture 7 Python Game Development)
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
 

How to balance between Security and Agile Development

  • 1. How to balance between Security and Agile Development Regional Scrum Gathering Tokyo 2021 Makoto IGUCHI (Kii Corporation)
  • 2. The relationship between security and agile development… It’s got to be good, right?
  • 3. In reality… • Will security put the brakes on DevOps and agile development (2016.12.26) https://www.atmarkit.co.jp/ait/articles/1612/19/news128.html
  • 4. Today’s talk 1. A small trick to achieve a good relationship between security and agile development  “Absolute” vs. “Relative” thinking 2. Experiment for building a good relationship @ my workplace  “Shift left” using a card game  Rethinking the “value” of security tasks
  • 5. Self Introduction • Makoto Iguchi@ https://jp.kii.com/ • Scrum Master • Security Architect  Responsible for doing everything possible to improve the security of the product • Head of ISMS Internal auditors A company developing and operating a cloud service for IoT platform and solutions.
  • 6. A small trick to achieve a good relationship between Security and Agile Development
  • 7. How is it in your workplace? Relationship between security and development in your workplace is: 1. Excellent 2. Good 3. Fair 4. Poor
  • 9. From Japan Information Security Audit Association Result of the survey released on 2020/1/6 https://www.jasa.jp/seminar/sec_trend2020/
  • 11. What’s wrong here? Example) Checklists, such as Information Security Management/Audit Standards … all-too-common model of security as a team, which sits and snipes at the people who actually build things, telling them no and pointing fingers, is in fact fantastically counterproductive. --- Your Security team is probably an infuriating obstacle – but it doesn’t have to be this way (TechCrunch 2019/8/8) Make sure to pass all the checklist items! Pass all “high” priority items, or no release is allowed!
  • 12. Is the checklist absolute?? The checklist should be followed blindly… It should be utilized relative to the current situation  対応を要する項目の発 見と取捨選択 of course not!
  • 13. Actual example Information Security Management Standards (rev. 2016) by Ministry of Economy, Trade and Industry 「II 本管理基準の位置づけ」に以下の記載 本管理基準は、組織体における情報セキュリティマネジメントの円滑 で効果的な確立を目指して、マネジメントサイクル構築の出発点から 具体的な管理策に至るまで、包括的な適用範囲を有する基準となって いる。当然のことではあるが、組織体が属する業界又は事業活動の特 性等を考慮し、必要に応じて本管理基準の趣旨及び体系に則って、本 管理基準の項目等を取捨選択、追加又は統合することにより、該当す る関係機関において独自の管理基準を策定し活用することが望ましい。 https://www.meti.go.jp/policy/netsecurity/downloadfiles/IS_Management_Standard_H28.pdf
  • 14. Trick to build a good relationship “Absolute” thinking “Relative“ thinking Man-month estimate Story point estimate Fixed spec and schedule Priority and schedule refinement per sprint
  • 15. WHY DON’T YOU BECOME A DEMON? RELATIVE- THINKER?
  • 16. Experiment for building a good relationship
  • 17. Experiment @ my workplace Sprint backlog Product backlog 脅 威 Realizing “shift left” using a card game Properly loading security tasks onto the sprint backlog
  • 19. Shift-left security Designing Implementing Operating/maintaining HERE
  • 20. STRIDE Threat Analysis • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege A good reference on threat analysis →
  • 21. STRIDE card game (EoP card game) The Elevation of Privilege Threat Modeling Card Deck https://github.com/adamshostack/eop
  • 24. This is quite difficult… Security is difficult with agile methods (2018.12.13) https://japan.zdnet.com/article/35130079/ The problem of putting off security tasks
  • 25. Piling up items to maximize values What is Agile? by Henrik Kniberg
  • 26. 脅 威 Does it mean that security tasks do not contribute to adding values to the product?
  • 27. Rethinking security tasks Security Task Tasks for fixing product weaknesses (vulnerabilities) that are found through threat analysis • Vulnerabilities continue to exist until the task is completed • Vulnerabilities disappear when the task is completed
  • 28. Let’s think vulnerability as a bomb Even if there is a bomb in the product, it does not affect the value of the product as long as it does not explode. Once it explodes, the value of the product is brown away completely.
  • 29. Security task and product value Task for dismantling bomb in the product • The task itself does not increase the product value • The task prevents bombs from exploding and destroying the product value
  • 30. Sprint Planing Sprint backlog Product backlog 脅 威 Bomb dismantling backlog Load implementation tasks to efficiently increase product value Load dangerous items that are about to explode to avoid them from blowing up product value
  • 31. 「ときメ○」モデル 女の子からの評価 スクラム アジャ子 インプリ セキュ実 好雄 「こんなとこだな。 爆発しない限り価値=好感度 に影響を及ぼさないが、爆発 すると今まで積んだ好感度が 吹っ飛んでしまう。  適宜爆弾処理が必要 価値=好感度を上げる ために効率よく実装 タスクをこなしていく
  • 32. MVP (Minimum Viable Product) with MBP (Manageable Bomb Placement) What is Agile? by Henrik Kniberg
  • 33. Spotting dangerous bombs relatively As with product backlog, the bomb dismantling backlog need to be refined on a regular basis to load the appropriate security tasks on time e.g., Vulnerability = “No Brake” Not dangerous Getting dangerous Completely out of control
  • 34. “Too much bomb” case: Zoom A Message to Our Users (April 1, 2020) https://blog.zoom.us/a-message-to-our-users/ • Suspended new feature development for 90 days • Focused on solving security/privacy issues
  • 35. Balancing security and agile development is possible! You can do it!

Editor's Notes

  1. 話さないこと:開発中のセキュリティ:DAST/SAST、リリース前のセキュリティ:テスト自動化