SlideShare a Scribd company logo
1 of 19
Download to read offline
Shift Left Security – Guidance on embedding security for a Digital
Transformation in the Financial Industry
Yazad Khandhadia, VP, Security Architecture & Engineering, Emirates NBD
@YazKay2
https://www.linkedin.com/in/yazadk/
Agenda
• Intro: Typical Digital Transformation Challenges in Security: The Dialogue
• Challenges & Solutions: A Snapshot (via a High Level View)
• Creating a Belief System: Shift Left/Rugged/Whatever You Wanna Call It 
• Challenges & Solutions: Deep Dives – People, Process & Technology
• Measuring Success: Metrics & Our Success Story
• End Notes
• Outro – Q & A
Typical Digital Transformation Challenges in Security – Classic Dialogues 
DEVELOPER + INFRA + DEVOPS + ARCH
“we don’t have the freedom to use our tools”
“we develop, deploy faster, you need to review
faster”
“we need to explore Open Source; licensing is
killing us”
“It’s release day, we need sign-offs!”
“ I have too much pressure” 
CYBER/INFORMATION SECURITY
“some tools are dangerous; we deny”
“there is only so much we can do”
“open source is insecure”
“you came to me last minute”
“I have to answer to regulators, internal
audit and risk ”
Audience Poll: What do you ‘feel’ is the biggest challenge ?
Challenges & Solutions: A Snapshot
Phase 1
(Q4 2017)
Phase 2
(Q1-Q4 2018)
Phase 3
(Q1-Q4 2019)
Phase 4
(Q1 – Q4 2020)
AMBIGUITY/TOO MUCH FLUX / THINGS CHANGE VERY QUICKLY + LOTS OF NEW TECH
AGILITY + FLEXIBILITY + ECOSYSTEMS (LEGACY/HETEROGENOUS) + OPTIMIZE COSTS + DEVELOPER EXP
PEOPLE: UNLEARN TRADITIONAL + Hire Awesome Talent + Coach /Train Talent + Build Awareness
PROCESS: Agile Runbook (Socialize Security) + Security Engagement Model + Build Patterns
TECHNOLOGY/TOOLING: Interim State – Manual Reviews | Target State: e.g. 80% Security Automation
INNOVATE: THINK NEW + Embed Security as Code + Build Security as a Service (via APIs)
PLAN DO (EXECUTE)
CHECK
(MONITOR)
ACT
(IMPROVE)
We built our belief system within Security: Our Manifesto*
Leaning in over Always Saying “No”: Help the Developer solve the problem;
Data & Security Science over Fear, Uncertainty and Doubt (FUD): Convince using FACTS
Open Contribution & Collaboration over Security-Only Requirements: Don't say “its your problem” instead say "how
can I help you”
Consumable Security Services with APIs over Mandated Security Controls & Paperwork: Build Security APIs
Business Driven Security Scores over Rubber Stamp Security: Show real risk
Red & Blue Team Exploit Testing over Relying on Scans & Theoretical Vulnerabilities: Convince with exploits
24x7 Proactive Security Monitoring over Reacting after being Informed of an Incident: Build this in patterns/stories
Shared Threat Intelligence over Keeping Info to Ourselves: With IT-Ops, Audit and Fraud/Risk & Business teams
Compliance Operations over Clipboards & Checklists: We are still trying to figure this out 
* Taken from devsecops.org
Executing Our Belief System: Shift Left / Rugged DevOps
Key Takeaway: Finding flaws EARLY and Fixing them EARLY has massive benefits – Reducing
Risk & Cost
Shift Left : Hiring Good Talent KEY TAKEWAYS:
• TAKE MATTERS INTO YOUR OWN HANDS
• DESIGN YOUR OWN CUSTOM CRITERIA &
TESTS
• COMMUNICATION , COLLABORATION &
DECISION MAKING SKILLS ARE KEY
• PASSION & PERSEVERENCE ARE VITAL – TELL
PERSONNEL TO EXPECT LATE NIGHTS!
• HIRE JACK OF ALL – HELPS WITH ADAPTIBILITY
& AMBIGUITY
• HIRE EMPATHY/INNOVATIVE PERSONNEL
• ALL SECURITY PERSONNEL MUST KNOW HOW
AGILE WORKS & AGILE TERMINOLOGY (e.g.
DOD, MVP, etc.)
Shift Left: Help Developers & DevOps
KEY TAKEWAYS:
• DEVSECOPS MUST TALK TO DEVS MORE OFTEN WITHIN
SQUADS
• DEVSECOPS SIT IN THE SQUAD THE WHOLE TIME – IT’S
LIKE THEIR FAMILY
• DEVSECOPS MUST “GUIDE” DEVELOPERS – NOT JUST
DUMP REPORTS ON THEM
• DEVSECOPS MUST NOT “BE CONDESCENDING” ; THEY
NEED TO “BE UNDERSTANDING & EMPATHETIC”
• DEVSECOPS MUST COMMUNICATE KEY SECURITY
REQUIREMENTS, DECISIONS & RISKS EARLY
• DEVSECOPS MUST TRACK DEFECTS & REPORT THEM SO
THAT SECURITY AWARENESS CAN BE “TARGETTED”
“We will operate like developers to make security and
compliance available to be consumed as services. We
will unlock and unblock new paths to help others see
their ideas become a reality”
“We will learn the loopholes, look for weaknesses, and
we will work with you to provide remediation actions
instead of long lists of problems for you to solve on your
own”
“Rugged organizations create secure code as a
byproduct of their culture”
“Rugged describes software development organizations
that have a culture of rapidly evolving their ability to
create available, survivable, defensible, secure, and
resilient software. Rugged organizations use
competition, cooperation, and experimentation to learn
and improve rather than making the same mistakes
over and over”
* Quotes from https://www.devsecops.org/ & https://ruggedsoftware.org/
Shift Left: Help Developers & DevOps – Educating Developers
Gamified
Learning 
KEY TAKEWAYS:
• GET BUY-IN FROM HEAD OF DEVELOPMENT /
DEV CHAPTER HEAD & LEARNING &
DEVELOPMENT DEPARTMENTS FOR BUDGETS
• RUN REGULAR ASSESSMENTS FOR DEVS
(WHITE, YELLOW, ORANGE, BLACK BELT
ASSESSMENTS)
• START SLOW AND GRADUALLY INCREASE
DIFFICULTY
• REWARD DEVS WHO DO WELL !!
• TIE DEFECTS FROM SQUADS BACK TO SPECIFIC
DEV TRAINING; SO THAT THEY SPEND MORE
TIME ON IMPROVING WHAT THEY MAY DO
WRONG
Hands On 
Learn @ Ur Own
Pace 
Shift Left: Develop, Implement & Fine-Tune Processes – Key Takeaways
BUILD AN ENGAGEMENT
MODEL (e.g. We built 7 gates
and included all lines of
defense)
CONSULT RED & BLUE TEAMS
ON NEW THREATS AND EMBED
THEM BACK INTO YOUR
PATTERNS
PARTICIPATE OR LEAD A
CHANGE IN PROCESSES FOR
PRE-GO LIVE SIGN OFFS
BUILD A ENTERPRISE
SECURTITY REFERENCE
ARCHITECTURE (ESA)
BUILD RE-USABLE
SECURITY
PATTERNS/CONTROLS
CODIFY PATTERNS (SECURITY
AS CODE); REQUEST A
SQUAD FOR IT !!
BUILD RE-USABLE SECURITY
PATTERNS
CONTRIBUTE TO THE AGILE
RUN BOOK
SOCIALIZE SECURITY IN AGILE
VIA WORKSHOPS (I DID 6-7 IN
2019 ALONE!!)
ENSURE OPS SECURITY (LAST
GATE!!) -
BE THERE FOR ALL CHANGE
APPROVAL BOARD MTGS !
Shift Left: Peoplee & Process: MESHED
EVERY SECURITY
SQUAD HAS ATLEAST
ONE SECURITY
PERSONNEL
(DEVSECOPS)
GET INVOLVED
IMMEDIATELY POST
BUDGET APPROVAL
ATTEND BACKLOG
GROOMING &SPRINT
PLANNING
DESIGN SECURITY
REQUIREMENTS IN THE
FORM OF EVIL
STORIES
---- USER STORY ---
AS A “CUSTOMER” I
WOULD LIKE TO “ ADD
A BENEFECIARY TO
TRANSFER MONEY”
---- EVIL STORY 1 ---
AS AN ATTACKER I
WILL PHISH YOU AND
GET YOUR PASSWORD
AND SMS OTP
---- EVIL STORY 2 ---
AS AN ATTACKER I
WILL….. XXXXXXXX
--CONTROL 1 (PREV)--
MANDATE IN-APP
NOTIFICATION AS
PRIMARY AUTH
---CONTROL 2 (DET)--
ALERT CUST WHEN
BENEFICIARY IS ADDED
PUBLISH EVIL
STORIES ON
COLLABORATION
SOFTWARE (e.g. JIRA)
FOR ENTIRE SQUAD
TO SEE AND
IMPLEMENT
Shift Left: Technology
Start
Here Devs find
issues
very early
here
Fixes before release
If they miss it, they find
it here 
Shift Left: Technology – Key Takeaways
KEY TAKEWAYS:
• INSERT “THRESHOLDS” IN
AUTOMATION PIPELINES (e.g. ZERO
HIGH, 5 MEDIUM, 10 LOW)
• SECURE ALL ELEMENTS OF THE
PIPELINE – BASE OS, IMAGE,
CONTAINER, ORCHESTRATION
ENGINE, THE ACTUAL CODE
• ENSURE DEVS ALWAYS PULL SECURE
LIBRARIES AND USE ONLY SECURE
CONTAINERS
• USE WIKIS FOR PATTERNS / COLLAB
TOOLS FOR SECURITY OBSERVATIONS
• USE CHAT TOOLS (WITH AUDITING)
FOR CHANGE CONTROL / APPROVALS
Key Takeaways: People, Process & Technology – Metrics
Ask every Team/Squad to rate
security personnel in their squad
Measure developer education
using stats on gamified
platforms
Map all your KPIs to a cyber
security maturity model (think
NIST or others)
Take a count of how many
automated pipelines have
security thresholds built in
Gauge how well security
personnel make autonomous
decisions (on their own)
Check how many initiatives did
not follow your engagement
model (aka “gates skipped”)
Measure how many developers
are attending secure coding
induction and tournaments
Check how often & well you
document on a Wiki in order to
pass your Audits
Track Defects: Observe how
often you see the same coding
defects being repeated; re-
educate developers
Measure how many squads are
meeting your patterns / non-
negotiables
Measure how busy security
personnel are in Squads – add
more to prevent burnout
Measure how many security
personnel completed trainings
on new tech (e.g. kubernetes)
Key Takeaways: People, Process & Technology – Measuring Success
Our Architects/DevSecOps
Engineers are rated highly by
squads
Our developer security education
is working well – defects have
reduced over time
We contributed to our overall
Cyber Security Maturity Score
Team Awards – “Best Agile
Supporters”
Individual Awards – Top
Performers/Potential Leaders
We adapt amazingly to Waterfall
& Agile methods
Our security checks are
embedded in all pipelines
(where applicable)
We win by Influencing not by
Authority aka we have built trust
with DevOps
We fared exceptionally well on all
our Audits
We are building “security as a
service”; we automate security
via APIs (where possible)
We reduced the time for security
sign offs thanks to inclusion from
all lines of defense
Adherence to our 7 gates is
model is very high
End Note
CULTURE CHANGE TAKES TIME AND TONS OF EFFORT !! KEEP AT IT!
COLLABORATE: DROP THE FINGERPOINTING! FOCUS ON THE SOLUTION
SOCIALIZE: INFORM & EDUCATE ALL LINES OF DEFENSE/STAKEHOLDERS
CHANGE YOUR MINDSET / UNLEARN: DON’T APPLY TRAD’L THINK TO AGILE
DON’T TRY & BE PERFECT  YOU WILL FAIL! FAIL QUICK, LEARN FROM IT &
MOVE ON!
BE PATIENT & PREPARED: IT’S A LONG & TIRING ROAD! A LOT OF
CONVINCING TO BE DONE! PUSH YOURSELF & YOUR TEAM! STAY HEALTHY!
TALENT: HIRE PEOPLE WHO WILL BUY INTO YOUR VISION! NO PASSION, NO
SUCCESS!
Outro – Q & A
@YazKay2
https://www.linkedin.com/in/yazadk/
References
https://www.torbenrick.eu/blog/culture/organisational-culture-eats-strategy-for-breakfast-lunch-and-dinner/
https://ruggedsoftware.org/
https://www.devsecops.org/

More Related Content

What's hot

DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015Shannon Lietz
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...SeniorStoryteller
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConTom Stiehm
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Eturnti Consulting Pvt Ltd
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_programShannon Lietz
 
Practical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOpsPractical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOpsPriyanka Aash
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security peoplePriyanka Aash
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleJames Wickett
 
Legacy-SecDevOps (AppSec Management Debrief)
Legacy-SecDevOps (AppSec Management Debrief)Legacy-SecDevOps (AppSec Management Debrief)
Legacy-SecDevOps (AppSec Management Debrief)Dinis Cruz
 
Skillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxSkillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxEoin Keary
 
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)DJ Schleen
 
Shifting Security Left - The Innovation of DevSecOps - AgileDC
Shifting Security Left - The Innovation of DevSecOps - AgileDCShifting Security Left - The Innovation of DevSecOps - AgileDC
Shifting Security Left - The Innovation of DevSecOps - AgileDCTom Stiehm
 
Implementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenImplementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenSeniorStoryteller
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareSeniorStoryteller
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsJames Wickett
 
Failure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanentFailure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanentTom Stiehm
 
A worldwide journey to build a secure development environment
A worldwide journey to build a secure development environmentA worldwide journey to build a secure development environment
A worldwide journey to build a secure development environmentPriyanka Aash
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019 Elizabeth Ayer
 

What's hot (20)

DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
Practical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOpsPractical appsec lessons learned in the age of agile and DevOps
Practical appsec lessons learned in the age of agile and DevOps
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 
A DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and PeopleA DevSecOps Tale of Business, Engineering, and People
A DevSecOps Tale of Business, Engineering, and People
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
Legacy-SecDevOps (AppSec Management Debrief)
Legacy-SecDevOps (AppSec Management Debrief)Legacy-SecDevOps (AppSec Management Debrief)
Legacy-SecDevOps (AppSec Management Debrief)
 
Skillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxSkillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant flux
 
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
 
Shifting Security Left - The Innovation of DevSecOps - AgileDC
Shifting Security Left - The Innovation of DevSecOps - AgileDCShifting Security Left - The Innovation of DevSecOps - AgileDC
Shifting Security Left - The Innovation of DevSecOps - AgileDC
 
Implementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ SchleenImplementing DevOps in a Regulated Environment - DJ Schleen
Implementing DevOps in a Regulated Environment - DJ Schleen
 
DevSecOps - Building Rugged Software
DevSecOps - Building Rugged SoftwareDevSecOps - Building Rugged Software
DevSecOps - Building Rugged Software
 
The New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOpsThe New Ways of Chaos, Security, and DevOps
The New Ways of Chaos, Security, and DevOps
 
Failure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanentFailure is inevitable but it isn't permanent
Failure is inevitable but it isn't permanent
 
A worldwide journey to build a secure development environment
A worldwide journey to build a secure development environmentA worldwide journey to build a secure development environment
A worldwide journey to build a secure development environment
 
DevSecOps at Agile 2019
DevSecOps at   Agile 2019 DevSecOps at   Agile 2019
DevSecOps at Agile 2019
 

Similar to Shift Left Security – Guidance on embedding security for a Digital Transformation in the Financial Industry

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
Why 'positive security' is a software security game changer
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changerJaap Karan Singh
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 
Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff WilliamsDevSecCon
 
SC conference - Building AppSec Teams
SC conference  - Building AppSec TeamsSC conference  - Building AppSec Teams
SC conference - Building AppSec TeamsDinis Cruz
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
The Principles of Secure Development - David Rook
The Principles of Secure Development - David RookThe Principles of Secure Development - David Rook
The Principles of Secure Development - David RookSecurity B-Sides
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?Izar Tarandach
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!Steven Carlson
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009Security Ninja
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application SecurityChristian Martorella
 
HouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchHouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchSpencer Koch
 

Similar to Shift Left Security – Guidance on embedding security for a Digital Transformation in the Financial Industry (20)

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Why 'positive security' is a software security game changer
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changer
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff Williams
 
SC conference - Building AppSec Teams
SC conference  - Building AppSec TeamsSC conference  - Building AppSec Teams
SC conference - Building AppSec Teams
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
The Principles of Secure Development - David Rook
The Principles of Secure Development - David RookThe Principles of Secure Development - David Rook
The Principles of Secure Development - David Rook
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
A journey into Application Security
A journey into Application SecurityA journey into Application Security
A journey into Application Security
 
HouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from ScratchHouSecCon 2019: Offensive Security - Starting from Scratch
HouSecCon 2019: Offensive Security - Starting from Scratch
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Shift Left Security – Guidance on embedding security for a Digital Transformation in the Financial Industry

  • 1. Shift Left Security – Guidance on embedding security for a Digital Transformation in the Financial Industry Yazad Khandhadia, VP, Security Architecture & Engineering, Emirates NBD @YazKay2 https://www.linkedin.com/in/yazadk/
  • 2. Agenda • Intro: Typical Digital Transformation Challenges in Security: The Dialogue • Challenges & Solutions: A Snapshot (via a High Level View) • Creating a Belief System: Shift Left/Rugged/Whatever You Wanna Call It  • Challenges & Solutions: Deep Dives – People, Process & Technology • Measuring Success: Metrics & Our Success Story • End Notes • Outro – Q & A
  • 3. Typical Digital Transformation Challenges in Security – Classic Dialogues  DEVELOPER + INFRA + DEVOPS + ARCH “we don’t have the freedom to use our tools” “we develop, deploy faster, you need to review faster” “we need to explore Open Source; licensing is killing us” “It’s release day, we need sign-offs!” “ I have too much pressure”  CYBER/INFORMATION SECURITY “some tools are dangerous; we deny” “there is only so much we can do” “open source is insecure” “you came to me last minute” “I have to answer to regulators, internal audit and risk ”
  • 4. Audience Poll: What do you ‘feel’ is the biggest challenge ?
  • 5. Challenges & Solutions: A Snapshot Phase 1 (Q4 2017) Phase 2 (Q1-Q4 2018) Phase 3 (Q1-Q4 2019) Phase 4 (Q1 – Q4 2020) AMBIGUITY/TOO MUCH FLUX / THINGS CHANGE VERY QUICKLY + LOTS OF NEW TECH AGILITY + FLEXIBILITY + ECOSYSTEMS (LEGACY/HETEROGENOUS) + OPTIMIZE COSTS + DEVELOPER EXP PEOPLE: UNLEARN TRADITIONAL + Hire Awesome Talent + Coach /Train Talent + Build Awareness PROCESS: Agile Runbook (Socialize Security) + Security Engagement Model + Build Patterns TECHNOLOGY/TOOLING: Interim State – Manual Reviews | Target State: e.g. 80% Security Automation INNOVATE: THINK NEW + Embed Security as Code + Build Security as a Service (via APIs) PLAN DO (EXECUTE) CHECK (MONITOR) ACT (IMPROVE)
  • 6. We built our belief system within Security: Our Manifesto* Leaning in over Always Saying “No”: Help the Developer solve the problem; Data & Security Science over Fear, Uncertainty and Doubt (FUD): Convince using FACTS Open Contribution & Collaboration over Security-Only Requirements: Don't say “its your problem” instead say "how can I help you” Consumable Security Services with APIs over Mandated Security Controls & Paperwork: Build Security APIs Business Driven Security Scores over Rubber Stamp Security: Show real risk Red & Blue Team Exploit Testing over Relying on Scans & Theoretical Vulnerabilities: Convince with exploits 24x7 Proactive Security Monitoring over Reacting after being Informed of an Incident: Build this in patterns/stories Shared Threat Intelligence over Keeping Info to Ourselves: With IT-Ops, Audit and Fraud/Risk & Business teams Compliance Operations over Clipboards & Checklists: We are still trying to figure this out  * Taken from devsecops.org
  • 7. Executing Our Belief System: Shift Left / Rugged DevOps Key Takeaway: Finding flaws EARLY and Fixing them EARLY has massive benefits – Reducing Risk & Cost
  • 8. Shift Left : Hiring Good Talent KEY TAKEWAYS: • TAKE MATTERS INTO YOUR OWN HANDS • DESIGN YOUR OWN CUSTOM CRITERIA & TESTS • COMMUNICATION , COLLABORATION & DECISION MAKING SKILLS ARE KEY • PASSION & PERSEVERENCE ARE VITAL – TELL PERSONNEL TO EXPECT LATE NIGHTS! • HIRE JACK OF ALL – HELPS WITH ADAPTIBILITY & AMBIGUITY • HIRE EMPATHY/INNOVATIVE PERSONNEL • ALL SECURITY PERSONNEL MUST KNOW HOW AGILE WORKS & AGILE TERMINOLOGY (e.g. DOD, MVP, etc.)
  • 9. Shift Left: Help Developers & DevOps KEY TAKEWAYS: • DEVSECOPS MUST TALK TO DEVS MORE OFTEN WITHIN SQUADS • DEVSECOPS SIT IN THE SQUAD THE WHOLE TIME – IT’S LIKE THEIR FAMILY • DEVSECOPS MUST “GUIDE” DEVELOPERS – NOT JUST DUMP REPORTS ON THEM • DEVSECOPS MUST NOT “BE CONDESCENDING” ; THEY NEED TO “BE UNDERSTANDING & EMPATHETIC” • DEVSECOPS MUST COMMUNICATE KEY SECURITY REQUIREMENTS, DECISIONS & RISKS EARLY • DEVSECOPS MUST TRACK DEFECTS & REPORT THEM SO THAT SECURITY AWARENESS CAN BE “TARGETTED” “We will operate like developers to make security and compliance available to be consumed as services. We will unlock and unblock new paths to help others see their ideas become a reality” “We will learn the loopholes, look for weaknesses, and we will work with you to provide remediation actions instead of long lists of problems for you to solve on your own” “Rugged organizations create secure code as a byproduct of their culture” “Rugged describes software development organizations that have a culture of rapidly evolving their ability to create available, survivable, defensible, secure, and resilient software. Rugged organizations use competition, cooperation, and experimentation to learn and improve rather than making the same mistakes over and over” * Quotes from https://www.devsecops.org/ & https://ruggedsoftware.org/
  • 10. Shift Left: Help Developers & DevOps – Educating Developers Gamified Learning  KEY TAKEWAYS: • GET BUY-IN FROM HEAD OF DEVELOPMENT / DEV CHAPTER HEAD & LEARNING & DEVELOPMENT DEPARTMENTS FOR BUDGETS • RUN REGULAR ASSESSMENTS FOR DEVS (WHITE, YELLOW, ORANGE, BLACK BELT ASSESSMENTS) • START SLOW AND GRADUALLY INCREASE DIFFICULTY • REWARD DEVS WHO DO WELL !! • TIE DEFECTS FROM SQUADS BACK TO SPECIFIC DEV TRAINING; SO THAT THEY SPEND MORE TIME ON IMPROVING WHAT THEY MAY DO WRONG Hands On  Learn @ Ur Own Pace 
  • 11. Shift Left: Develop, Implement & Fine-Tune Processes – Key Takeaways BUILD AN ENGAGEMENT MODEL (e.g. We built 7 gates and included all lines of defense) CONSULT RED & BLUE TEAMS ON NEW THREATS AND EMBED THEM BACK INTO YOUR PATTERNS PARTICIPATE OR LEAD A CHANGE IN PROCESSES FOR PRE-GO LIVE SIGN OFFS BUILD A ENTERPRISE SECURTITY REFERENCE ARCHITECTURE (ESA) BUILD RE-USABLE SECURITY PATTERNS/CONTROLS CODIFY PATTERNS (SECURITY AS CODE); REQUEST A SQUAD FOR IT !! BUILD RE-USABLE SECURITY PATTERNS CONTRIBUTE TO THE AGILE RUN BOOK SOCIALIZE SECURITY IN AGILE VIA WORKSHOPS (I DID 6-7 IN 2019 ALONE!!) ENSURE OPS SECURITY (LAST GATE!!) - BE THERE FOR ALL CHANGE APPROVAL BOARD MTGS !
  • 12. Shift Left: Peoplee & Process: MESHED EVERY SECURITY SQUAD HAS ATLEAST ONE SECURITY PERSONNEL (DEVSECOPS) GET INVOLVED IMMEDIATELY POST BUDGET APPROVAL ATTEND BACKLOG GROOMING &SPRINT PLANNING DESIGN SECURITY REQUIREMENTS IN THE FORM OF EVIL STORIES ---- USER STORY --- AS A “CUSTOMER” I WOULD LIKE TO “ ADD A BENEFECIARY TO TRANSFER MONEY” ---- EVIL STORY 1 --- AS AN ATTACKER I WILL PHISH YOU AND GET YOUR PASSWORD AND SMS OTP ---- EVIL STORY 2 --- AS AN ATTACKER I WILL….. XXXXXXXX --CONTROL 1 (PREV)-- MANDATE IN-APP NOTIFICATION AS PRIMARY AUTH ---CONTROL 2 (DET)-- ALERT CUST WHEN BENEFICIARY IS ADDED PUBLISH EVIL STORIES ON COLLABORATION SOFTWARE (e.g. JIRA) FOR ENTIRE SQUAD TO SEE AND IMPLEMENT
  • 13. Shift Left: Technology Start Here Devs find issues very early here Fixes before release If they miss it, they find it here 
  • 14. Shift Left: Technology – Key Takeaways KEY TAKEWAYS: • INSERT “THRESHOLDS” IN AUTOMATION PIPELINES (e.g. ZERO HIGH, 5 MEDIUM, 10 LOW) • SECURE ALL ELEMENTS OF THE PIPELINE – BASE OS, IMAGE, CONTAINER, ORCHESTRATION ENGINE, THE ACTUAL CODE • ENSURE DEVS ALWAYS PULL SECURE LIBRARIES AND USE ONLY SECURE CONTAINERS • USE WIKIS FOR PATTERNS / COLLAB TOOLS FOR SECURITY OBSERVATIONS • USE CHAT TOOLS (WITH AUDITING) FOR CHANGE CONTROL / APPROVALS
  • 15. Key Takeaways: People, Process & Technology – Metrics Ask every Team/Squad to rate security personnel in their squad Measure developer education using stats on gamified platforms Map all your KPIs to a cyber security maturity model (think NIST or others) Take a count of how many automated pipelines have security thresholds built in Gauge how well security personnel make autonomous decisions (on their own) Check how many initiatives did not follow your engagement model (aka “gates skipped”) Measure how many developers are attending secure coding induction and tournaments Check how often & well you document on a Wiki in order to pass your Audits Track Defects: Observe how often you see the same coding defects being repeated; re- educate developers Measure how many squads are meeting your patterns / non- negotiables Measure how busy security personnel are in Squads – add more to prevent burnout Measure how many security personnel completed trainings on new tech (e.g. kubernetes)
  • 16. Key Takeaways: People, Process & Technology – Measuring Success Our Architects/DevSecOps Engineers are rated highly by squads Our developer security education is working well – defects have reduced over time We contributed to our overall Cyber Security Maturity Score Team Awards – “Best Agile Supporters” Individual Awards – Top Performers/Potential Leaders We adapt amazingly to Waterfall & Agile methods Our security checks are embedded in all pipelines (where applicable) We win by Influencing not by Authority aka we have built trust with DevOps We fared exceptionally well on all our Audits We are building “security as a service”; we automate security via APIs (where possible) We reduced the time for security sign offs thanks to inclusion from all lines of defense Adherence to our 7 gates is model is very high
  • 17. End Note CULTURE CHANGE TAKES TIME AND TONS OF EFFORT !! KEEP AT IT! COLLABORATE: DROP THE FINGERPOINTING! FOCUS ON THE SOLUTION SOCIALIZE: INFORM & EDUCATE ALL LINES OF DEFENSE/STAKEHOLDERS CHANGE YOUR MINDSET / UNLEARN: DON’T APPLY TRAD’L THINK TO AGILE DON’T TRY & BE PERFECT  YOU WILL FAIL! FAIL QUICK, LEARN FROM IT & MOVE ON! BE PATIENT & PREPARED: IT’S A LONG & TIRING ROAD! A LOT OF CONVINCING TO BE DONE! PUSH YOURSELF & YOUR TEAM! STAY HEALTHY! TALENT: HIRE PEOPLE WHO WILL BUY INTO YOUR VISION! NO PASSION, NO SUCCESS!
  • 18. Outro – Q & A @YazKay2 https://www.linkedin.com/in/yazadk/