<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Clément JOLLIET, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/clement-jolliet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/clement-jolliet/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 12 Jul 2021 08:54:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Clément JOLLIET, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/clement-jolliet/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/</link>
		
		<dc:creator><![CDATA[Clément JOLLIET]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 10:21:29 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[2021]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[emerging topics]]></category>
		<category><![CDATA[opportunities]]></category>
		<category><![CDATA[priorities]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15064</guid>

					<description><![CDATA[<p>Since the last edition of the radar, the world has been hit hard by an unprecedented viral pandemic. This has piled on the pressure to fast track digital transformations set in a context of increasingly active cybercriminals and an ever-growing threat. Against...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/">CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Since <a href="https://www.wavestone.com/en/insight/ciso-radar-2020/">the last edition of the radar</a>, the world has been hit hard by <a href="https://www.wavestone.com/en/insight/cybersecurity-in-the-face-of-the-health-crisis/">an unprecedented viral pandemic</a>. This has piled on the pressure to fast track digital transformations set in a context of increasingly active cybercriminals and an ever-growing threat. Against this twin backdrop of public-health and economic crises, what should you do to plan for 2021? And what are the trends to watch to assure cybersecurity in large organizations?</p>
<p style="text-align: justify;">One fundamental theme won’t change: the threat – the starting point for all thinking about cybersecurity. In our view, unsurprisingly, ransomware will remain the major threat facing businesses. Since the end of 2019, and the exploits of <strong>Maze</strong>, <strong>Sodinokibi</strong>, and, more recently <strong>Egregor</strong>, these destructive attacks have been paired with massive data exfiltration – adding a new dimension to criminal blackmail operations. All types of organizations are affected: from local authorities, through SMEs, to large international groups – wherever they are in the world.</p>
<p style="text-align: justify;">In addition, as we recently discussed in <a href="https://www.lemonde.fr/economie/article/2020/11/15/comment-le-cybercrime-se-professionnalise-en-s-attaquant-aux-particuliers-et-aux-entreprises_6059830_3234.html"><em>Le Monde</em></a>, cybercriminal operations have become <strong>highly professionalized</strong>, ensuring the perpetrators reap a <strong>return on their considerable investments</strong>. These investments will enable them to mount increasingly deep, and technically sophisticated, attacks in the future – attacks that will have no qualms about <strong>targeting activities that are core to business functions</strong> (such as industrial networks, payment systems, etc.). In 2021, the stakes in <strong>the tug of war over the payment of ransoms</strong> are likely to be raised – with a determined effort by criminal groups to achieve higher <strong>profile</strong> attacks.<strong> We saw some early signs</strong> this year with the use of <strong>sophisticated procedures</strong>: from an attack being announced via Facebook advertisements, through direct negotiation with patients in healthcare-sector attacks, to the printing of ransom demands via in-store cash registers… There will be a need to anticipate such situations to the maximum extent possible, either by simulating them in crisis exercises or by tailoring specific, well-thought-out responses in advance.</p>
<p style="text-align: justify;">In addition to the many-headed beast of ransomware, our teams out in the field anticipate strong growth in two other threat areas in 2021. First, <strong>indirect attacks, using third-party services</strong>: cybercriminals are heavily focused on circumventing the security arrangements of major players by exploiting vulnerabilities in their less-protected partners or targeting their IT service providers. In addition, <strong>attacks that target cloud-based systems are expected to accelerate and manifest new types of compromise</strong>. Exploiting vulnerabilities in identity and access management (<strong>IAM</strong>), in particular via supplier APIs to compromise ever more critical areas of business, will be one of the hallmarks of incidents in 2021. Today, this area represents a real challenge for IT teams, who are still much too unfamiliar with the fast-developing particularities of these platforms.</p>
<p style="text-align: justify;">Faced with such a range of threats, CISOs will need to be both agile and robust, especially in their mastery <strong>of security fundamentals</strong> (in particular, the Active Directory, the application of patches, and multi-factor authentication) and in solidly demonstrating their <strong>cyber-resilience</strong> capabilities (with ever-more demanding commitments in terms of reconstruction times and the ability of business functions to be resilient without IT capacity).</p>
<p style="text-align: justify;">In parallel, there are several areas that will be central to developments in IT departments, and CISOs can turn them into <strong>opportunities</strong> to improve cybersecurity within their organizations. In particular, we have in mind “Digital Workplace” projects – and the work to optimize available security measures, which will have to be done against the current backdrop of constrained budgets. Previous years’ investments in cybersecurity have often added new functionalities that are little known or used, especially when it comes to the cloud. Looking to these may offer a way to improve cybersecurity at lower cost.</p>
<p style="text-align: justify;">From a regulatory perspective, 2021 will see another increase in issues linked to <strong>cyber borders</strong> or even cyber-protectionism. It will mean considering demanding <strong>isolation and protection requirements</strong>, and also the issue of the interconnection of <strong>new and little-known systems</strong> (for example, Alibaba in China, Yandex in Russia, etc.) with organizational networks.</p>
<p style="text-align: justify;">In terms of technological developments to keep in mind, we have identified three trends: <strong>Zero-trust, <a href="https://www.wavestone.com/en/insight/quantum-computing-cybersecurity-wavestone-francedigitale/">Confidential Computing</a></strong>, and<strong> Quantum Computing.</strong> We discuss these in more detail below and set out the minimum level of monitoring that you should plan for.</p>
<p style="text-align: justify;">Threats are becoming more complex and resources increasingly limited… CISOs will need to demonstrate their agility in 2021, by addressing a range of issues while still maintaining a clear strategic direction: they’ll need to be able to protect their organizations against cyber criminals while supporting, or even developing, new digital uses.</p>
<figure id="post-15058 media-15058" class="align-none" style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-15058 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1.jpg" alt="" width="2048" height="1418" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1.jpg 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-1536x1064.jpg 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Radar_CISO_2021_v1-1-245x170.jpg 245w" sizes="(max-width: 2048px) 100vw, 2048px" /></figure>
<div class="heading-text el-text" style="text-align: justify;">
<h2>Methodology</h2>
</div>
<div class="uncode_text_column">
<p style="text-align: justify;">The <strong>CISO Radar</strong> is a tool that Wavestone has developed and published since 2011. More than <strong>40 experts</strong> meet <strong>three times a year</strong> to discuss news and key topics, based on what they’ve observed while working with Wavestone’s clients. This assessment includes all Wavestone’s offices – from New York to Hong Kong – taking in Paris and several others.</p>
<p style="text-align: justify;">Every year, the Radar presents <strong>a broad selection of the topics that CISOs have to grapple with in their role</strong>. It covers over 100 topics, which are considered and analyzed by our experts.</p>
<div class="row-container" style="text-align: justify;" data-parent="true" data-section="1">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode_text_column">
<p>It’s presented as a series of dials covering <strong>key themes</strong> (identity, protection, detection, risk management, compliance, and continuity) <strong>on three levels:</strong> <strong>Mature, News, </strong>and<strong> Emergent</strong>. The “Mature” level covers topics that every CISO can, and must, master. The “News” level covers topics currently being addressed; these are new areas where initial feedback can be shared. The “Emergent” level covers topics on the horizon that are still little known or that have no obvious solutions. These topics are included to better predict future developments and prepare for their emergence in organizations.</p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-container" data-parent="true" data-section="2">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width" style="text-align: justify;">
<div class="heading-text el-text">
<h2>What are the threads to develop in 2021?</h2>
<h3>Mastery of cybersecurity fundamentals</h3>
<p>Patches not being applied; weaknesses in Active Directories; vulnerabilities in attack channels… In 2020, cybercriminals have regularly reminded us of the importance of mastering cybersecurity fundamentals. Unsurprisingly, we believe these fundamentals will remain key in 2021 – a time when cyber attackers are likely to remain highly opportunistic (<strong>58%</strong> according to an assessment of recent incidents where Wavestone has <a href="https://www.wavestone.com/en/insight/cyberattack-france-situation-on-the-ground/">provided support</a>) and where we continue to see a daily stream of new fixes to critical vulnerabilities.</p>
<p>Now is the time for cybersecurity teams to act on their responsibilities: they can no longer operate in the background in their key areas – such as the management and maintenance of security, which are core to digital trust and other key systems. CISOs will need to be robust and responsive in opening up these areas with production teams. We should note that startups like <a href="https://www.hackuity.io/">Hackuity</a> can bring new impetus and help unlock the complex process of vulnerability management.</p>
<h3>Consolidate work on cyber-resilience</h3>
<p>For several years now, cyber-resilience has been a phrase on everybody’s lips – and rightly so. As we observe, cybercriminals are an increasingly active menace. It’s no longer a question of “Will we be attacked?” but “<em>When</em> will we be attacked?”  Against this backdrop, it’s essential to have in place an appropriate strategy and be prepared to respond to an attack – by limiting its impact, in order to restart as securely and quickly as possible. In 2021, the involvement of business functions will remain an issue that continues to occupy security teams as they work to increase efficiency.</p>
<p>Nevertheless, we’re now seeing a new trend in cyber-resilience: CISOs are increasingly being asked to provide concrete evidence of the organization’s capacity to resist and recover from a cyber-attack. Percentage of production capacity preserved in the event of a loss of IT and the resilience of business activities; the precise timescale for rebuilding core confidence; and the restoration of data under time constraints… Both regulators and business leaders are asking for guarantees and defined commitments to provide them with reassurance. In such a context, we should be prepared to push systems to their limits; for example, by conducting realistic reconstruction tests, working in partnership with operational teams.</p>
<p>&nbsp;</p>
</div>
</div>
<div class="heading-text el-text" style="text-align: justify;">
<h2>Which areas represent opportunities for cybersecurity?</h2>
</div>
<h3 class="clear" style="text-align: justify;">Continuing pressure to make progress on digital transformation</h3>
<div style="text-align: justify;">
<p>It’s a matter of fact that the public-health crisis has allowed many organizations to take major steps toward creating latest-generation digital workspaces. This situation presents a real opportunity for CISOs, who can capitalize on it by becoming involved in numerous innovative projects and help their organizations move to an in-depth<em>, </em>cloud-based approach.</p>
<p>More than ever, it offers an opportunity for cybersecurity teams to deliver a step change in approach and overcome numerous long-standing challenges: the simplification of remote access, authentication that reduces the use of passwords (Passwordless), enhanced detection of data leaks, expansion of SOCs and cloud-related detection capacities, etc.</p>
<h3>Cyber-effectiveness</h3>
<p>In a period when expenditure is under greater scrutiny than ever, CISOs must continue to rationalize the use of their budgets, while also demonstrating the effectiveness of the interventions they make. Given this, one of the first actions you should consider is the scope to capitalize on investments made in previous years: teams already in place and, for technical solutions or cloud-based services undergoing rapid changes, unlocking functionalities that can be easily activated at no additional cost. A genuinely rich seam to provide better security in the year ahead. In some areas, outsourcing may be an option in the interests of rationalizing costs.</p>
<p>For some business sectors, cybersecurity may become, or may already be, a market differentiator. CISOs, then, have an opportunity to develop their role – by getting closer to the business functions and unlocking cross-functional projects that were previously unworkable.</p>
<h3>Borders in cyberspace</h3>
<p>While the internet is often considered a borderless space, there is an increasing tendency among regulators, and some countries, to want to ringfence data within their borders and prevent it from being hosted elsewhere. This trend is firming in Europe, where we saw the GDPR come into effect in 2018, and, more recently, a ruling that <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091fr.pdf">the US Privacy Shield is invalid</a>; but also in China and Russia, where new regulations are proliferating, some of which could be classed as examples of “cyber-protectionism.”</p>
<p>As a result, many regulators and authorities are imposing rules that only encrypted data can be stored abroad, the key to which is a closely guarded secret (HYOK). This situation requires rethinking on data flows, the systems that will host them, and especially the need to adapt to local solutions. This presents a real challenge for CISOs; for example, when considering connections between the networks of global organizations that are using French, American, Russian, and Chinese systems… Integrating these systems into an overall cybersecurity approach is a real challenge in the face of their fragmentation and the difficulties in making a concrete assessment of the risks and the quality of the systems to be used.</p>
<p>&nbsp;</p>
<div class="heading-text el-text">
<h2>What are the emerging topics for 2021 and beyond?</h2>
<h3>Taking a new, entirely cloud-based approach, with Zero trust</h3>
<p>Promoted by Forrester in the late noughties, use of the <strong>Zero Trust</strong> security model is on the rise. As a reminder, this system is the opposite of the traditional <strong>castle</strong> approach, which aimed to defend the periphery using sizable ramparts (i.e., firewalls), but which is gradually being rendered impotent in the face of new threats.</p>
<p>Digital transformation has had profound impacts on system architecture and interconnections with third parties. As a result, it is no longer enough to protect oneself from the outside only; so much so, that even the concept of “the outside” is no longer that meaningful: nowadays threats can more easily use their target’s ecosystem to penetrate systems and compromise them. Access management, identities, and privileged accounts are central to the <strong>Zero Trust</strong> model – areas pertinent to many of the problems we face today. In 2021, businesses will continue their move toward the cloud. This provides a real opportunity to gradually base architectures and systems on the <strong>Zero-Trust</strong> principle, or, for latecomers, to begin to clear the way for it.</p>
<h3>Get ready for a data-protection revolution with confidential computing</h3>
<p>One of the major challenges for the cloud remains that of trust with the various partners involved, especially when it comes to organizations’ most sensitive data. In response to this problem, concepts like Confidential Computing and Data Privacy by Design have emerged gradually over recent years, in parallel with more concrete solutions.</p>
<p>Among these, <strong>homomorphic encryption</strong> enables algorithms to encrypt data while maintaining the option of processing it, something that greatly reduces the risks of disclosure and data leakage. IBM is one step ahead here, and, in the summer of 2020, shared its open-source library, <a href="https://github.com/shaih/HElib">HElib</a>, on the topic. French startups Cosmian and Zama are also active in the area.</p>
<p>Lastly, <strong>synthetic data</strong> can also offer an original response to the issue. By using algorithms enhanced by artificial intelligence, synthetic data generators, such as the one offered by British startup Hazy make it possible to create data sets that retain the characteristics and logic of the real data without featuring that data in any way. Yet another way to avoid any risk of a data breach in the cloud.</p>
<h3>Anticipate longer-term threats from Quantum computing</h3>
<p>Eight hours: this is the time it will take a sufficiently powerful and reliable quantum computer to undermine the security of our communications by breaking today’s commonly used encryption algorithms. <a href="https://www.wavestone.com/en/insight/informatique-quantique-et-cybersecurite_francedigitale_wavestone/">The global technological race has already begun</a>, and companies and institutions must begin preparing themselves now, because considerable investments will be needed to put in place the required <strong>technical migrations</strong>. Which data must be protected as a priority, because it needs to remain confidential in the years to come? Which clauses should I include in my contracts today, to ensure the systems I purchase are compatible with the new encryption solutions? And which providers can support these migrations?</p>
<p>In France, several players have already taken the initiative for example the INRIA-Sorbonne spin-off <strong>CryptoNext-Security</strong> – the winner of several innovation competitions, which offers a quantum-safe cryptography solution that has already been tested by the French army for use with an instant-messaging application on mobiles.</p>
<div class="post-content">
<div class="row-container" data-parent="true" data-section="5">
<div class="row limit-width row-parent" data-imgready="true">
<div class="row-inner">
<div class="pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell">
<div class="uncont no-block-padding col-custom-width">
<div class="uncode-accordion" data-collapsible="no" data-active-tab="1">
<div id="accordion_308999376" class="panel-group" role="tablist" aria-multiselectable="true">
<div class="panel panel-default">
<div id="anticipate-longer-term-threats-from-quantum-computing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p>It’s an area that raises many questions, which will all need to be rapidly addressed. One thing is certain though: CISOs will have a major role in these developments and need to anticipate the many related activities that will be required.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/ciso-between-post-covid-world-and-persistent-threats-what-are-the-priorities-for-2021/">CISO, between post-COVID world and persistent threats, what are the priorities for 2021?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to conduct an Agile Cyber Security workshop?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/10/how-to-conduct-an-agile-cyber-security-workshop/</link>
		
		<dc:creator><![CDATA[Clément JOLLIET]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 08:00:19 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[agile project]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Transformation]]></category>
		<category><![CDATA[user stories]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14373</guid>

					<description><![CDATA[<p>We talked about it in a previous article, the agile digital transformation is on the way and this new model requires a total rethinking of the way security is integrated into projects. In this article, we will discover how to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-conduct-an-agile-cyber-security-workshop/">How to conduct an Agile Cyber Security workshop?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We talked about it in a <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/">previous article</a>, the agile digital transformation is on the way and this new model requires a total rethinking of the way security is integrated into projects. In this article, we will discover how to conduct an agile Cybersecurity workshop, allowing to define Evil User Stories (EUS) and Security Stories. Find below a brief reminder of the fundamental notions to understand the rest.</p>
<figure id="post-12288 media-12288" class="align-center">
<figure id="post-14430 media-14430" class="align-center"><img decoding="async" class="aligncenter size-full wp-image-14430" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/user-stories.png" alt="" width="962" height="418" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/user-stories.png 962w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/user-stories-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/user-stories-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/user-stories-768x334.png 768w" sizes="(max-width: 962px) 100vw, 962px" /></figure>
</figure>
<p>&nbsp;</p>
<h2>The EUS &amp; Security Stories workshop: Who, when, where?</h2>
<p>First of all, we can only advise you to involve in this workshop the usual actors of agile ceremonies:</p>
<ul>
<li><em><strong>The Product Owner</strong></em> (PO) as a representative of business needs</li>
<li><strong><em>The Agile Coach</em></strong> in his capacity as guarantor of the respect of the method</li>
<li><strong>The technical referents</strong> of the project (architect, developers, testers&#8230;)</li>
</ul>
<p>To bring a cyber security eye, it is important to count on the presence of the <strong>Security Champion</strong> from the project team. If none is available, a member of the CISO team can replace him or her and will have the Cyber Security &#8220;mindset&#8221; to guide you and complete the workshop.</p>
<p>Then, one often wonders when these workshops should be conducted&#8230; To tell you the truth, there is no rule about this, as it will depend on the security requirements of each release! However, our first piece of advice on this subject is to <strong>synchronize their frequency with that of the product backlog review</strong>. So, all you need to do is extend the workshops where you work on <em>User Stories</em> by about 50% to devote yourself to this security study with all the right players already present and mobilized.</p>
<p>Finally, where should the workshop be held? Ideally in the continuity of your previous workshop, in a room with a board or a projector allowing you to share a screen and the possibility to annotate the diagrams quite easily (post-its, whiteboard markers&#8230;). However, it is also possible to do it online! At Wavestone, we regularly use solutions such as <a href="https://www.mural.co/">Mural</a> or <a href="https://stormboard.com/">Stormboard</a> for this purpose. Get your hands on a solution like this and see if it&#8217;s playable!</p>
<p>&nbsp;</p>
<h2>Course of the workshop</h2>
<p>First of all, it is often necessary for the <em>Security Champion</em> to lead the way in the first workshops. But the idea is to coordinate with the Agile Coach and work together so that the technical referents can gradually take charge of the methodology and make it their own.</p>
<p>When we train our clients on the subject, we often take a use case, fictitious but concrete and realistic! WaveCare is a medical application with many innovative features such as :</p>
<ul>
<li>Consulting the availability of practitioners near you</li>
<li>Real-time transmission of your health data thanks to your connected watch</li>
<li>Realization of remote consultations in Visio (Skype conference)</li>
<li>Receipt of the order after the appointment in dematerialized format</li>
</ul>
<p>For this demonstration, let&#8217;s focus on two components in particular: the descriptive schema of the <strong>functionality allowing a patient to search and reserve a slot</strong> in his doctor&#8217;s diary and the general architecture schema.</p>
<figure id="post-13190 media-13190" class="align-center">
<figure id="post-14432 media-14432" class="align-center"><img decoding="async" class="aligncenter  wp-image-14432" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-1-5.png" alt="" width="863" height="578" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-1-5.png 728w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-1-5-285x191.png 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-1-5-58x39.png 58w" sizes="(max-width: 863px) 100vw, 863px" /></figure>
</figure>
<p style="text-align: center;">&#8211;</p>
<figure id="post-13186 media-13186" class="align-center">
<figure id="post-14434 media-14434" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-14434" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-2.png" alt="" width="854" height="575" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-2.png 711w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-2-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-2-2-58x39.png 58w" sizes="auto, (max-width: 854px) 100vw, 854px" /></figure>
</figure>
<h2></h2>
<h3>Step 1: Building risk scenarios</h3>
<p>The first questions to ask yourself are &#8220;Where am I vulnerable? &#8220;How and where can I be attacked? ». The <em>Security Champion</em> and the developers will have to try to answer these questions! Here, a mix of application security and development knowledge will help identify exploitable vulnerabilities. We can already see an interesting aspect of the approach: it works on both the infrastructure and application aspects!</p>
<p>One piece of advice we can already give you: encourage developers to take ownership of the approach and to be proactive, it&#8217;s an excellent lever for raising security awareness! For the security referent, his or her role should mainly be to moderate the exchange and challenge the developers&#8217; proposals. This position can also help you identify potential <em>Security Champions</em>, so don&#8217;t skimp on keeping it!</p>
<p>So let&#8217;s apply what we have just said to our example, in the figures below.</p>
<figure id="post-13192 media-13192" class="align-center">
<figure id="post-14436 media-14436" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-14436" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-3-1.png" alt="" width="872" height="587" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-3-1.png 895w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-3-1-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-3-1-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-3-1-768x517.png 768w" sizes="auto, (max-width: 872px) 100vw, 872px" /></figure>
</figure>
<p style="text-align: center;">&#8211;</p>
<figure id="post-13188 media-13188" class="align-center">
<figure id="post-14438 media-14438" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-14438" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-4.png" alt="" width="902" height="603" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-4.png 826w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-4-286x191.png 286w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-4-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/image-4-768x513.png 768w" sizes="auto, (max-width: 902px) 100vw, 902px" /></figure>
</figure>
<p>And here we are, we can finally identify quite quickly some points of attention! If we want to detail the &#8220;<strong>Code Injection</strong>&#8221; scenario of the global architecture schema, we can for example rephrase it like this: &#8220;<strong>As an attacker, I want to inject malicious code into the application&#8217;s insecure input fields</strong>&#8220;. You see, this ending is very close to that of a classic <em>User Story</em>, but the angle is indeed that of the attacker!</p>
<p>&nbsp;</p>
<h3>Step 2: Evaluate the business impacts of the scenarios</h3>
<p>The second phase will be key to ensure that the team&#8217;s energy is used in the right place. This is where the <em>Product Owner</em> comes in! Together with the <em>Security Champion</em>, he will lead the debate to qualify the impact that each vulnerability can have.</p>
<p>Why is the PO decisive at this stage? Quite simply because <strong>he is the one who knows best both the business reality of the project and the importance of each feature</strong>. He will need to be well oriented, with questions such as &#8220;Is it serious if the data sent by the patient at this point is stolen? &#8220;What is the seriousness of the theft of the user&#8217;s account? etc.&#8221;, etc.</p>
<p>Next, you will need to give a score to prioritize each scenario. You then have two choices. The first is to use a classic cyber risk view, with a level of probability and impact. Personally, I recommend you rather use a point system or the Fibonacci suite, as for a classic US, it&#8217;s frankly simpler and instinctive!</p>
<p>&nbsp;</p>
<h3>Step 3: Define and prioritize Security Stories</h3>
<p>The next step will be to build <em>Security Stories</em> based on each of the scenarios.</p>
<p>Now it&#8217;s the turn of the <em>Security Champion</em> and the developers to get back on stage! To continue on the previous example, here is a <em>Security Story</em> we can write: &#8220;<strong>As a developer, I want to make sure that code injection attacks are avoided</strong>&#8220;. Concretely, it will make us add to the product <em>backlog</em> actions such as escaping special characters, filtering user input or using the HttpOnly attribute to prevent the theft of session cookies.</p>
<p>Obviously, for each of the <em>Security Stories</em>, it may turn out that the security measures to be implemented are already in place. Otherwise, the <em>Security Champion</em> will prioritize the technical security measures, with regard to covering the risks involved, on a company-wide scale and not only on a business level. For security measures that are not purely technical, it is up to the <em>Product Owner</em> to prioritize them, with regard to business risks and the team&#8217;s resources.</p>
<p>And there you have it, you can now start your sprint more serenely!</p>
<p>&nbsp;</p>
<h2>And to help you, prepare and adapt the material to your context!</h2>
<p>To make the workshops simpler and more fun, we have designed a generic deck of cards, consisting of cards with two sides each:</p>
<ul>
<li><strong>Front side</strong>: the <em>Evil User Stories</em>, they describe in a very pedagogical way what can go wrong, using which vulnerabilities (ex: privilege escalation on a Web server, brute force attack, XSS, &#8230;).</li>
<li><strong>Verso</strong>: the <em>Security Stories</em> describe the security measures to be implemented to ensure that the <em>Evil User Story</em> does not occur (e.g. use of a robust AES 256/512 encryption algorithm, &#8230;).</li>
</ul>
<p>These cards are really useful to get you started! For best results, you can even choose to <strong>adapt them to your business context</strong>. Use your security policies and integrate your requirements on encryption, password complexity, etc. Depending on the security needs of the project, you can also copy requirements related to certifications (HDS) or guidelines (LPM, NIS).</p>
<p><strong>You can find the card game available for free <a href="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Security-Agility-Card-game_EN.pdf">here</a></strong> and don&#8217;t hesitate to give us your feedback so that we can continue to improve it!</p>
<p>Also, a workshop that runs smoothly is always more productive! Don&#8217;t forget to <strong>prepare the materials beforehand</strong>: architecture diagrams of the project (data flow and classification), listing and details of the next User Stories to be developed&#8230;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-conduct-an-agile-cyber-security-workshop/">How to conduct an Agile Cyber Security workshop?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to effectively evaluate your cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/</link>
		
		<dc:creator><![CDATA[Clément JOLLIET]]></dc:creator>
		<pubDate>Tue, 30 Jun 2020 13:00:04 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Analyze]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[ISO27k]]></category>
		<category><![CDATA[Level]]></category>
		<category><![CDATA[Maturity]]></category>
		<category><![CDATA[REX]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Roadmap]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13312</guid>

					<description><![CDATA[<p>Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">How to effectively evaluate your cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security managers often bring us in to <strong>evaluate their cybersecurity maturity level</strong>. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards, and measure exposure to recent attacks.</p>
<p>But these projects are not only the work of systems security managers. These projects also come from executive committees who seek a<strong> 360 view of the security of their institution</strong> to better evaluate potential risk. So, what are key success factors that we have seen in the field?</p>
<p>&nbsp;</p>
<h2>Step 1: Know the purpose and expectations of your evaluation</h2>
<p>Evaluations can be entirely different <strong>levels of depth</strong>. From a high-level interview with the Chief Security officer to an in-depth assessment of the security mechanisms and processes of all the subsidiaries of a multinational group, everyone can choose their areas of focus and advance step-by-step.</p>
<p>Our first advice is to <strong>keep in mind the objectives of your evaluation</strong>. This will allow you to orient yourself toward the right security benchmarks and ultimately define the depth of the evaluation. Do you only want to measure the security maturity of your subsidiary’s information systems or also its efficiency? Perfectly documented security processes and an ISO 27001 certification can unfortunately hide problems on the ground that can expose you to vulnerabilities. It can be judicious to combine a technical test (pentest, red team, etc.) to the evaluation in order to <strong>avoid situations that seem fine on the surface but hide underlying issues</strong>.</p>
<p>&nbsp;</p>
<h2>Step 2: Find and mobilize the right people at the right level, easy to say but harder to do…</h2>
<p>The next difficulty that you can encounter in your assessment is to succeed at meeting the right people. From experience, we advise you to confirm your list of the necessary collaborators as soon as possible.</p>
<p>Logically, this list will certainly depend on the granularity of the analysis but also on the organization of the business. For example, the necessary people will differ if the security staff are at the group level and function as a service center or if they are merged into each entity and service. Consequently, if you want to have a high-level estimate first, it could suffice to only have a half day exchange with the Chief Security Officer, who generally has a sufficient and global vision of the subject.</p>
<p>The second stage of analysis can be performed in gathering information from all actors involved in cybersecurity at the group level. In this group, it can be interesting to meet a large group of people involved in information systems and the cloud.</p>
<p>Finally, when the assessment must be thorough and exhaustive, it becomes necessary to widen the list of collaborators to all of the concerned entities. Obviously, you should expect a larger workload, so do not skimp on preparation and tools to help you in your work. It can also be the right moment to think about your presentation format: face-to-face, distance, strategic, operational, etc.</p>
<p>&nbsp;</p>
<h2>Step 3: Equipment, finding the right balance between too much and not enough</h2>
<p>Choosing the right tools is one of the main assessment challenges that you will face. The more complete the assessment, the more it will require tools that ensure simplification and understanding of the whole project. Indeed, for large evaluations, the <strong>consolidation and restitution of results are two of the great challenges that you will encounter</strong>. In particular, commonly used tools don’t take into account the organizational complexity of large groups or the effectiveness of allocated resources. It is for these reasons that, from our side, we have chosen to develop a specific tool.</p>
<p>A good tool also allows you to position yourself against your competitors and understand your exposure to current attack trends and points where your COMEX is particularly sensitive, ensuring you can legitimize the assessment.</p>
<p>So it begins! It’s time to get your hands dirty and start the work of collecting information! There is a classic phrase that applies to these situations: entirely feasible from a distance. Be aware and transparent about the limits of the exercise: those questioned will sometimes have the impression that the assessment is too theoretical and this is normal, according to their objectives. During this phase, it will also be necessary to be able to juggle between the various unknowns because it is not uncommon to have people who are ultimately absent for long periods of time, added parameters, changes in methodology. Make it a point of honor to remain agile.</p>
<p>&nbsp;</p>
<h2>Step 4: Reforming at the right level to act, everything is a question of the point of view</h2>
<p>A good habit to keep is to honestly adapt each reform to each person. From the managerial summaries where we talk about trends without much detail to presentations for technical teams that are highly detailed, adapting the discourse to the necessary format is important to convey the right messages to the right people.</p>
<p>Usually, we start the reforms in terms of the organization’s budget and workforce dedicated to cybersecurity. These very concrete points allow you to attract attention and be able to then analyze the situation from four different angles:<br />
· Compliance with different global benchmarks (ISO/NIST)<br />
· Assessment of the level of maturity of different entities compared to others in the same sector or market<br />
· Quantification of the effort reach the market level and/or the required level according to cybersecurity benchmarks<br />
· Evaluation of the level of robustness of the organization against the last known cyberattacks</p>
<p>With senior management, the restitution is often going to focus on organizational and governance matters. However, there can always be surprises. In cases where businesses have already been hit by serious cyber attacks, we have had surprisingly precise and technical questions from executive committees. For example, we have been asked for details on encryption algorithms and “How secure is my active directory?”</p>
<p>&nbsp;</p>
<h2>Get started</h2>
<p>As mentioned earlier, the maturity assessment is an effective means for <strong>measuring the effectiveness and progress of your cybersecurity roadmap</strong>. Consequently, even if you don’t want to immediately begin an assessment involving all security systems and dozens of teams at your business, <strong>we advise you to familiarize yourself with the approach</strong> and its usefulness in starting out with more modest goals.</p>
<p>At Wavestone, with years of experience and expertise, we have developed the <strong>W-Cyber-Benchmark</strong>, a multi-use tool that has been implemented by dozens of clients. We know that just writing about it isn’t enough, <a href="https://www.wavestone.com/en/contact/">so don’t hesitate to contact us to discuss further</a>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/how-to-effectively-evaluate-your-cybersecurity/">How to effectively evaluate your cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Comment conduire un atelier Cybersécurité agile ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/06/comment-conduire-un-atelier-cybersecurite-agile/</link>
		
		<dc:creator><![CDATA[Clément JOLLIET]]></dc:creator>
		<pubDate>Fri, 12 Jun 2020 07:41:33 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Gestion des risques]]></category>
		<category><![CDATA[How-to]]></category>
		<category><![CDATA[Projet Agile]]></category>
		<category><![CDATA[Transformation]]></category>
		<category><![CDATA[user stories]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13185</guid>

					<description><![CDATA[<p>Nous vous en parlions dans un précédent article, la transformation numérique agile est en marche et ce nouveau modèle impose de totalement revoir sa manière d’intégrer la sécurité dans les projets. Nous allons découvrir dans cet article comment conduire un...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/comment-conduire-un-atelier-cybersecurite-agile/">Comment conduire un atelier Cybersécurité agile ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nous vous en parlions dans <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/" target="_blank" rel="noopener noreferrer">un précédent article</a>, la transformation numérique agile est en marche et ce nouveau modèle impose de totalement revoir sa manière d’intégrer la sécurité dans les projets. Nous allons découvrir dans cet article comment conduire un atelier Cybersécurité agile, permettant de définir les <em>Evil User Stories (EUS) </em>et<em> Security Stories</em>. Trouvez ci-dessous un bref rappel des notions fondamentales pour comprendre la suite.</p>
<figure id="post-12288 media-12288" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-12288 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Diapositive2_rognee.png" alt="Atelier Cybersécurité Agile : les Evil User Stories et les Security User Stories" width="1032" height="502" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Diapositive2_rognee.png 1032w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Diapositive2_rognee-393x191.png 393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Diapositive2_rognee-768x374.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Diapositive2_rognee-71x35.png 71w" sizes="auto, (max-width: 1032px) 100vw, 1032px" /></figure>
<p>&nbsp;</p>
<h2>L’atelier EUS &amp; Security Stories : Qui, quand, où ?</h2>
<p>Tout d’abord, nous ne pouvons que vous conseiller d’impliquer dans cet atelier les habituels acteurs des cérémonies agiles :</p>
<ul>
<li><strong>Le <em>Product Owner</em> (PO)</strong> en sa qualité de représentant des besoins métiers</li>
<li><strong>Le <em>Coach</em> Agile</strong> en sa qualité de garant du respect de la méthode</li>
<li><strong>Les référents techniques</strong> du projet (architecte, développeurs, testeurs…)</li>
</ul>
<p>Pour apporter un œil cybersécurité, il est important de compter sur la présence du <strong><em>Security Champion</em></strong> de l’équipe projet. Si aucun n’est disponible, un membre de l’équipe du RSSI peut le remplacer et aura « l’état d’esprit » Cybersécurité pour vous aiguiller et mener l’atelier à bien.</p>
<p>Ensuite, on se demande souvent à quel moment ces ateliers doivent être conduits… Pour tout vous avouer, il n’y a pas de règle à ce sujet, car cela dépendra des exigences sécurité de chaque release ! Toutefois, notre premier conseil à ce sujet est de <strong>synchroniser leur fréquence avec celle de revue du backlog produit</strong>. Ainsi, il vous suffit de prolonger les ateliers où vous travaillez sur les <em>User Stories</em> d’environ 50% pour vous consacrer à cette étude sécurité avec déjà tous les bons acteurs présents et mobilisés.</p>
<p>Enfin, où réaliser l’atelier ? Idéalement dans la continuité de votre atelier précédent, dans une salle avec un tableau ou un projecteur permettant de partager un écran et la possibilité d’annoter les schémas assez facilement (post-its, feutres pour tableau blanc…). Néanmoins, il est également tout à fait envisageable de le faire en ligne ! Chez Wavestone, nous utilisons régulièrement des solutions comme <a href="https://www.mural.co/"><em>Mural</em> </a>ou <a href="https://stormboard.com/"><em>Stormboard</em> </a>à cet usage. Faites-vous la main sur une solution de ce genre et vous verrez si c’est jouable !</p>
<p>&nbsp;</p>
<h2>Déroulement de l’atelier</h2>
<p>Tout d’abord, il est souvent nécessaire que le <em>Security Champion</em> mène la barque dans les premiers ateliers. Mais l’idée est de se coordonner avec le Coach Agile et travailler de concert pour que les référents techniques puissent petit à petit prendre en main la méthodologie et se l’approprier.</p>
<p>Quand nous formons nos clients sur le sujet, nous prenons souvent un cas d’usage, fictif mais concret et réaliste ! WaveCare est une application médicale avec de nombreuses fonctionnalités innovantes telles que :</p>
<ul>
<li>Consultation des disponibilités de praticiens près de chez vous</li>
<li>Transmission en temps réel de vos données de santé grâce à votre montre connectée</li>
<li>Réalisation de consultations à distance en Visio (conférence Skype)</li>
<li>Réception de l’ordonnance après le RDV en format dématérialisé</li>
</ul>
<p>Pour cette démonstration, intéressons-nous à deux composants en particulier : le schéma descriptif de <strong>la fonctionnalité permettant à un patient de rechercher et réserver un créneau </strong>dans l’agenda de son médecin et le schéma d’architecture générale.</p>
<figure id="post-13190 media-13190" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-13190 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_1.jpg" alt="Schéma descriptif de la fonctionnalité &quot;Recherche et réservation d'un créneau par un patient&quot;" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_1-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_1-245x170.jpg 245w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></figure>
<p style="text-align: center;">&#8211;</p>
<figure id="post-13186 media-13186" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-13186 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_1.jpg" alt="Schéma descriptif de l'architecture de la solution" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_1.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_1-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_1-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_1-245x170.jpg 245w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></figure>
<h2></h2>
<h3><span style="color: #000000;">Etape 1 : Construire les scénarios de risque</span></h3>
<p>Les premières questions à se poser sont « Où-suis-je vulnérable ? », « Comment et par où peut-on m’attaquer ? ». Le référent sécurité (<em>Security Champion</em>) et les développeurs vont devoir essayer de répondre à ces questions ! Ici, c’est donc un mélange de connaissances en sécurité applicative et en développement qui va permettre d’identifier les vulnérabilités exploitables. Nous pouvons déjà noter un aspect intéressant de l’approche : elle fonctionne aussi bien sur l’aspect infrastructure qu’applicatif !</p>
<p>Un conseil que nous pouvons déjà vous donner : encouragez les développeurs à s’approprier l’approche et à être force de proposition, c’est un excellent levier pour les sensibiliser à la sécurité ! Pour le référent sécurité, son rôle doit majoritairement être de modérer l’échange et challenger les propositions des développeurs. Cette posture peut en plus vous permettre d’identifier des potentiels <em>Security Champions</em>, ne lésinez pas à la conserver !</p>
<p>Appliquons donc ce que nous venons de nous dire à notre exemple, dans les figures ci-dessous.</p>
<figure id="post-13192 media-13192" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-13192 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_2.jpg" alt="Schéma descriptif de la fonctionnalité &quot;Recherche et réservation d'un créneau par un patient&quot; avec les scénarios de risque " width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_2.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_2-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_2-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_2-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_feature_2-245x170.jpg 245w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></figure>
<p style="text-align: center;">&#8211;</p>
<figure id="post-13188 media-13188" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-13188 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_2.jpg" alt="Schéma descriptif de l'architecture de la solution avec les scénarios de risque" width="1040" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_2.jpg 1040w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_2-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_2-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_2-768x532.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/RI_HT_Atelier_ESU_archi_2-245x170.jpg 245w" sizes="auto, (max-width: 1040px) 100vw, 1040px" /></figure>
<p>Et voilà, on peut finalement identifier assez rapidement quelques points d’attention ! Si nous voulons détailler le scénario « <strong>Injection de code</strong> » du schéma d’architecture globale, nous pouvons par exemple le reformuler comme cela : « <strong>En tant qu&#8217;attaquant, je veux injecter du code malveillant dans les champs de saisie non sécurisés de l’application</strong> ». Vous voyez, cette terminaison est très proche de celle d’une <em>User Story</em> classique, mais l’angle est bien celui de l’attaquant !</p>
<p>&nbsp;</p>
<h3><span style="color: #000000;">Etape 2 : Evaluer les impacts métiers des scénarios</span></h3>
<p>La seconde phase va être clef pour s’assurer d’utiliser l’énergie de l’équipe au bon endroit. C’est à ce moment que le <em>Product Owner</em> entre en jeu ! Avec le <em>Security Champion</em>, il va mener les débats pour qualifier l’impact que peut avoir chaque vulnérabilité.</p>
<p>Pourquoi le PO est-il décisif sur cette étape ? Toute simplement car <strong>c’est lui qui connaît le mieux à la fois la réalité métier du projet et l’importance de chaque fonctionnalité</strong>. Il s’agira de bien l’orienter, avec des questions comme « Est-ce grave si les données envoyées à ce moment par le patient sont volées ? », « Quelle est la gravité du vol du compte de l’utilisateur ? », etc.</p>
<p>Ensuite, il vous faudra donner une note pour prioriser chaque scénario. Deux choix s’offrent alors à vous. Le premier est d’utiliser une vue risque cyber classique, avec un niveau de probabilité et d’impact. Personnellement, je vous recommande plutôt d’utiliser un système de point ou la suite de Fibonacci, comme pour une US classique, c’est franchement plus simple et instinctif !</p>
<p>&nbsp;</p>
<h3><span style="color: #000000;">Etape 3 : Définir et prioriser les Security Stories</span></h3>
<p>La prochaine étape consistera à construire des <em>Security Stories</em> basées sur chacun des scénarios.</p>
<p>Au tour du <em>Security Champion</em> et des développeurs de remonter sur scène ! Pour continuer sur l’exemple précédent, voici une <em>Security Story</em> que nous pouvons rédiger : « <strong>En tant que développeur, je veux m&#8217;assurer que les attaques par injection de code sont évitées </strong>». Concrètement, elle nous fera ajouter au <em>backlog</em> du produit des actions comme l’échappement des caractères spéciaux, le filtrage des entrées utilisateurs ou encore l’usage de l’attribut HttpOnly pour éviter le vol des cookies de session.</p>
<p>Evidemment, pour chacune des <em>Security Stories</em>, il peut s’avérer que les mesures de sécurité à mettre en œuvre le sont déjà. Dans le cas contraire, le <em>Security Champion</em> se charge de prioriser les mesures de sécurité techniques, au regard de la couverture des risques induits, à l’échelle de l’entreprise et pas uniquement du métier. Pour les mesures de sécurité n’étant pas uniquement techniques, c’est au <em>Product Owner</em> de les prioriser, au regard des risques business et des moyens de l’équipe.</p>
<p>Et voilà, vous pouvez maintenant démarrer votre sprint plus sereinement !</p>
<p>&nbsp;</p>
<h2>Et pour vous aider, préparez et adaptez le matériel à votre contexte !</h2>
<p>Pour rendre les ateliers plus simples et ludiques, nous avons conçus un jeu de cartes génériques, constitué de cartes ayant chacune deux faces :</p>
<ul>
<li><strong>Recto : </strong>les <em>Evil User Stories</em>, elles décrivent de façon très pédagogique ce qui peut mal se passer, en utilisant quelles vulnérabilités (ex : élévation de privilèges sur un serveur Web, attaque par force brute, XSS, …)</li>
<li><strong>Verso :</strong> les <em>Security Stories</em> décrivent les mesures de sécurité à implémenter pour s’assurer que <em>l’Evil User Story</em> ne se produit pas (ex : utilisation d’un algorithme de chiffrement robuste AES 256/512, …).</li>
</ul>
<p>Ces cartes sont vraiment utiles pour vous lancer ! Pour de meilleurs résultats, vous pouvez même choisir de <strong>les adapter à votre contexte d’entreprise</strong>. Utilisez vos politiques de sécurité et intégrez vos exigences sur le chiffrement, la complexité des mots de passe, etc. Suivant les besoins de sécurité du projet, vous pouvez aussi calquer de exigences liées à des certifications (HDS) ou des directives (LPM, NIS).</p>
<p><strong>Retrouvez le jeu de carte disponible gratuitement <a href="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Securite-Agilite-Jeu-de-cartes_VF.pdf" target="_blank" rel="noopener noreferrer">ici</a></strong> (et en anglais <a href="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/06/Security-Agility-Card-game_EN.pdf" target="_blank" rel="noopener noreferrer">ici</a>)et n’hésitez pas nous faire vos retours pour que nous continuions à l’améliorer !</p>
<p>Également, un atelier qui se déroule avec fluidité est toujours plus productif ! N’oubliez pas de <strong>préparer les supports en amont</strong> : schémas d’architecture du projet (flux et classification des données), listing et détail des prochaines <em>User Stories</em> à développer…</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/06/comment-conduire-un-atelier-cybersecurite-agile/">Comment conduire un atelier Cybersécurité agile ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
