<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>agile - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/agile/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/agile/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 21 Sep 2022 09:54:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>agile - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/agile/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Security in Agility and DevSecOps: linked fates?</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/09/security-in-agility-and-devsecops-linked-fates/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/09/security-in-agility-and-devsecops-linked-fates/#respond</comments>
		
		<dc:creator><![CDATA[Emma Barfety]]></dc:creator>
		<pubDate>Wed, 21 Sep 2022 16:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[CICD]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18781</guid>

					<description><![CDATA[<p>Is it necessary to engage in DevSecOps because projects work in Agile? A few questions need to be asked to get a clearer picture. In previous articles, we talked a lot about how security should be organised to accompany agile...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/09/security-in-agility-and-devsecops-linked-fates/">Security in Agility and DevSecOps: linked fates?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Is it necessary to engage in DevSecOps because projects work in Agile? A few questions need to be asked to get a clearer picture.</p>
<p style="text-align: justify;">In previous articles, we talked a lot about how security should be organised to accompany agile projects: <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/">the change in the security paradigm to ensure Security by Design</a>, how to organise the ISS teams in the face of these changes, the possible methodologies for continuing to <a href="https://www.riskinsight-wavestone.com/en/2020/06/comment-conduire-un-atelier-cybersecurite-agile/">analyse risks</a> or <a href="https://www.riskinsight-wavestone.com/en/2021/03/security-accreditation-for-agile-projects-how-to-successfully-do-it/">get security approvals</a> (and a general reminder of what <a href="https://www.riskinsight-wavestone.com/en/2021/10/agile-security/">security looks like in agile</a>).</p>
<p style="text-align: justify;">These articles were <strong>mainly about the organisational and methodological paradigm</strong> shifts that ISS teams were undergoing, to be able to best support projects, which deliver code much faster.</p>
<h2 style="text-align: justify;">The links between Agility and DevOps</h2>
<p style="text-align: justify;">By shifting the focus towards the <strong>development teams</strong>, it is now a question of dealing in greater depth with <strong>software solutions and processes enabling security to be integrated directly into the development pipelines</strong> and into the daily lives of developers, where Agile and DevOps methodologies, although they aim to provide the best value to customers, will be expressed differently.</p>
<p style="text-align: justify;">As the DevOps movement was born later than Agile methods, development teams were organised earlier than operations in an iterative and rapid mode for application and service delivery. DevOps principles bridge this gap by <strong>bringing Operations and Development teams closer together</strong>, and by offering solutions to accelerate delivery through the strong automation of the software development lifecycle, via CI/CD pipelines. In the end, the two approaches feed off and complement each other, to deliver faster and with better quality, thanks to the automation of a large number of tasks, thus avoiding human errors.</p>
<h2 style="text-align: justify;">What about security?</h2>
<p style="text-align: justify;">Back to our topic of interest, it is now a question of <strong>automating security as much as possible</strong>. Just like the Agile and DevOps methods, Security in Agile and DevSecOps are also closely related. The idea is to bring security closer and closer to the development teams, but also make it as fast as possible. A key profile of the security principles in Agile is perfectly suited to DevSecOps: the <strong>Security Champion</strong>. As described in the article &#8220;<a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">How to structure SSI teams to ensure security in Agile at scale</a>&#8220;, this is the security ambassador within the development teams. They are an integral part of the product team and are present in every sprint. Their role is to ensure that security is considered in each sprint in the development of User Stories (by integrating Evil or Security User Stories already written, or by helping to write them). The Security Champion can come from the world of development and become more skilled in security issues, with the help of the Security Guild.</p>
<p style="text-align: justify;">To take it a step further, the Security Champion can also help their team understand automated security solutions, with the help of a specialist from the ISS team, who will help them to develop their skills in <strong>application security</strong>.</p>
<p style="text-align: justify;">Having said that, is it because Agile Security and DevSecOps are linked that one should automatically embark on a transformation programme towards DevSecOps?</p>
<h2 style="text-align: justify;">Some preparatory questions for embarking on DevSecOps.</h2>
<p style="text-align: justify;">In line with any major transformation project, it is worth asking why you are doing it, making sure you have a plan and the <strong>right sponsorship</strong>. DevSecOps is no exception to the rule, even if the questions to ask are specific.</p>
<h3 style="text-align: justify;">Defining the scope and objectives</h3>
<p style="text-align: justify;">Firstly, before you start, you need to identify your <strong>motivating factors</strong>. Is it to deliver faster? Better? More securely? Will the problems encountered by the Dev, Sec and Ops teams be resolved by bringing the skills together? This is to prioritise efforts and ensure that the project can be &#8216;sold&#8217; to sponsors. Next, the <strong>scope</strong> must be identified, trying to delimit it between <strong>transitional scope</strong> (short and medium term) and <strong>target scope</strong> (long term). Work can start on an application portfolio, a factory for testing, followed by creation of a roadmap for deploying the model to the full scope.</p>
<p style="text-align: justify;">The <strong>current maturity</strong> of the organisation in terms of tooling and automation in the product development cycle should be assessed. A good knowledge of the tools used in the pipelines is a prerequisite. If there are still too many grey areas, an inventory of existing tools and an <strong>inventory of the practices and processes in place should be put together first.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Presence of the essential building blocks of the CI/CD pipeline</h3>
<p style="text-align: justify;">Before security can be integrated into development pipelines in an automated manner, it is first necessary to ensure that we have a good vision of what a state-of-the-art pipeline might look like. It is possible to embark on a DevSecOps programme without operational pipelines already installed but having a clear idea of the target is key. Here are some examples of solutions:</p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-18769 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image1.png" alt="" width="929" height="480" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image1.png 929w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image1-370x191.png 370w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image1-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image1-768x397.png 768w" sizes="(max-width: 929px) 100vw, 929px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; the essential building blocks of a DevOps pipeline</em></p>
<p style="text-align: justify;">The company must also be able to quantify the developments carried out internally or externally, with development agencies. Indeed, a complete pipeline will be useful for companies developing mainly in-house: it is an indispensable tool for developing quickly, with the right security tools integrated into the pipeline. In the case of external developments, the principle is different, and security is less &#8220;easy&#8221; to control: agencies will not necessarily give access to their pipelines or their source code. They may only deliver executables or images, via remote repositories for example. Integrating security is therefore done by more traditional means: via Security Assurance Plans (SAPs) for example, or by contractually obliging agencies to train their developers in application security, via training software solutions (for example CodeWarrior, which delivers &#8216;belts&#8217; according to the level of training achieved).</p>
<p style="text-align: justify;">Secondly, one of the most important ideas is that <strong>the pipeline is built in stages</strong>. In line with the &#8220;test and learn&#8221; approach dear to Agile methods, a &#8220;pilot&#8221; version of the pipeline can be deployed for a volunteer product team to test it over a few weeks/months. The deployment is then carried out progressively, according to a pre-established roadmap. In most cases, companies first set up a DevOps pipeline, with a few codes analysis tools (most often quality-oriented), then, once the pipeline is considered functional, the security tools are added.</p>
<p style="text-align: justify;">However, it could be worthwhile to consider security tools as an integral part of the CICD pipeline. They could then be integrated into it progressively, according to a prioritised roadmap, as proposed below.</p>
<p style="text-align: justify;">Here are some examples of tools that make up the security stack:</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter wp-image-18771 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image2.png" alt="" width="1225" height="344" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image2.png 1225w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image2-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image2-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/09/Image2-768x216.png 768w" sizes="(max-width: 1225px) 100vw, 1225px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Examples of security solutions to be integrated into the CICD pipeline (DevSecOps)</em></p>
<p style="text-align: justify;">According to our feedback from the field, some tools are &#8220;easier” to implement and are therefore implemented as a priority.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>Static Application Security Testing (SAST) tools</strong></p>
<p style="text-align: justify;">As mentioned earlier, these tools are nearly always already present in the initial pipeline, in their code quality testing format. Here it is a matter of <strong>configuring them to go one step further</strong> and perform security analysis of static code. This type of tool can be integrated at several points in the pipeline, in a &#8220;<strong>shift-left</strong>&#8221; logic, i.e., integrating security as early as possible in the pipeline. It can be positioned directly on the developers&#8217; IDEs (integrated development environment), to provide them with &#8220;real-time&#8221; feedback on errors that could introduce vulnerabilities. It can also be used at the time of code compilation.</p>
<p style="text-align: justify;">A disadvantage of this type of tool is the high number of false positives. The configuration is scalable and improves over time. However, the governance and processes around the tool need to be thought out in advance: a <strong>vulnerability triage</strong> team can be a solution, as well as training security champions to spot false positives, with the help of an application security expert (an Application Security Engineer for example).</p>
<p style="text-align: justify;"><strong>SCA (Software Composition Analysis) tools</strong></p>
<p style="text-align: justify;">These tools should logically be installed as a priority, as developers make great use of <strong>open-source libraries</strong> to develop their products. The SCA will check the components of the library, such as licences, dependencies, vulnerabilities, and potential exploits. Many attacks originate from the uncontrolled use of open-source libraries that may contain critical vulnerabilities (such as the Log4Shell exploit).</p>
<p style="text-align: justify;">This tool can be used like SAST, on IDEs or before compiling the code.</p>
<p style="text-align: justify;"><strong>DAST tools</strong></p>
<p style="text-align: justify;">DAST tools scan running application builds for security vulnerabilities. They allow the simulation of a malicious attacker&#8217;s behaviour through automated pen tests and detect common security vulnerabilities such as OWASP 10. These tools may be less easy to use in authenticated mode (authentication is difficult in automatic mode, it must be done manually before running a test). The tests also take longer than a static scan, and dedicated time must be set aside so as not to disrupt the work of developers or production.</p>
<p style="text-align: justify;">They can be used at the time of testing, but also in production.</p>
<p style="text-align: justify;">It is necessary to think very early on about <strong>the governance and processes</strong> to be put in place around these tools, in particular by ensuring that developers cannot ignore detected vulnerabilities (by passing them as &#8220;false positives&#8221;, for example) and to ensure that vulnerabilities are centralised in a single tool (vulnerability management tool, for example), for greater efficiency.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Checking the presence of enabling technical prerequisites</h3>
<p style="text-align: justify;">The interest in working in DevSecOps may be limited on non-configurable and non-instantiable software package type applications.</p>
<p style="text-align: justify;">On the infrastructure side, Infrastructure as Code (management and provisioning of infrastructure via code rather than manual processes) allows the use of containers or provisioned VMs that are key to use CICD pipelines more efficiently.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Not forgetting the whole governance and change management layer around the project</h3>
<p style="text-align: justify;">Make sure you build, or already have, an operating model that meets your needs (security champions, enabler teams, tooling, processes). Working in &#8220;agile at scale&#8221; mode is not mandatory for the first iterations (depending on the scope chosen).</p>
<p style="text-align: justify;">Using a &#8220;test and learn&#8221; method to <strong>experiment</strong> is a good way to involve the teams very early on, and to get complete and relevant feedback from the field, before starting to deploy at scale. Cybersecurity experiments have been carried out with clients to find out what types of practices or tools to implement.</p>
<p style="text-align: justify;">Some examples:</p>
<p style="text-align: justify;">&#8211; <strong>Purple teaming</strong> to allow developers to see the results of another team&#8217;s testing tools and attempt to exploit them (allowing developers to see the reality of an attack and the potential ease of carrying it out),</p>
<p style="text-align: justify;">&#8211; Implementing solutions such as <strong>Cloudbees</strong>, to automate the CICD pipeline processes,</p>
<p style="text-align: justify;">&#8211; Training Security Champions to <strong>interpret the results</strong> of security tools.</p>
<p style="text-align: justify;">These experiments also act as change management, as most stakeholders can be involved early in the transformation programme.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">In conclusion</h2>
<p style="text-align: justify;">CICD pipelines are a <strong>real opportunity for security to become automated</strong>. By integrating the right tools into the pipeline, developers are supported in their practice, kept on real security guardrails, facilitating the development of a secure product.</p>
<p style="text-align: justify;">In addition to securing the products, it is also a question of <strong>securing the pipeline itself</strong>, in the same way as any component with broad access to the information system: it is a question of controlling access to the various tools that make up the pipeline, ensuring that secrets are properly managed, that the underlying servers are hardened, etc.</p>
<p style="text-align: justify;">In a future article, we will detail our views on the pillars of DevSecOps, or how to achieve a sustainable and effective transformation (based on shift-left, guardrails and empowerment of the teams on security!).</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>Any comments or corrections? Do not hesitate to contact us!</strong></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/09/security-in-agility-and-devsecops-linked-fates/">Security in Agility and DevSecOps: linked fates?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/09/security-in-agility-and-devsecops-linked-fates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Agile Security, Emma Barféty interview</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/10/agile-security/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/10/agile-security/#respond</comments>
		
		<dc:creator><![CDATA[Emma Barfety]]></dc:creator>
		<pubDate>Mon, 11 Oct 2021 10:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[agility]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[scrum]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17026</guid>

					<description><![CDATA[<p>Emma, could you please introduce the topic ? Historically, the Agile approach is a set of practices used for IT development projects.  The Manifesto published in 2001 proposes 4 main values to revolutionise the performance of companies: This emphasis on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/agile-security/">Agile Security, Emma Barféty interview</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;"><strong>Emma, could you please introduce the topic ?</strong></h1>
<p style="text-align: justify;"><strong>Historically</strong>, the Agile approach is a set of practices used for <strong>IT development projects</strong>. </p>
<p style="text-align: justify;">The Manifesto published in 2001 proposes 4 main values to revolutionise the performance of companies:</p>
<p><img decoding="async" class="aligncenter wp-image-17027 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN.png" alt="" width="1512" height="281" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN.png 1512w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN-437x81.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-1-EN-768x143.png 768w" sizes="(max-width: 1512px) 100vw, 1512px" /></p>
<p style="text-align: justify;">This emphasis on human interaction between the development team and business teams aims at reducing the time to market of the products developed, as opposed to projects conducted in V-model which, once delivered, may no longer satisfy changing business requirements.</p>
<p style="text-align: justify;">Today, this practice is applied in <strong>most companies at all levels</strong>. In the latest <a href="https://stateofagile.com/#ufh-i-661275008-15th-state-of-agile-report/7027494"><em>State of Agile Report</em></a>, out of more than 4,000 companies surveyed worldwide, 95% declared that they use agile and 65% of them have been practising it for at least 3 years.  In addition to IT, the methodology is also used in marketing, human resources, sales, and finance departments. 52% of the companies surveyed stated that at least half of their company&#8217;s departments adopt agile processes and therefore the scalability of such practices should not be ignored.</p>
<p style="text-align: justify;">Beyond a project management method, it is a new philosophy with gamified elements. We no longer speak of meetings but of ceremonies, with new roles appearing such as product owner and scrum master. Using this philosophy, the desire is to create an <strong>atmosphere of co-construction and to make maximum use of collective intelligence</strong> to improve the company&#8217;s performance.</p>
<p style="text-align: justify;">Although the concept of security is present in the manifesto, the integration of such measures into product development is not properly addressed. The method by which security is implemented in V-model projects does not apply to the agile philosophy and thus new ways of implementing security should be identified for it.</p>
<p> </p>
<h1 style="text-align: justify;"><strong>What are the trends and challenges of this field? </strong></h1>
<p style="text-align: justify;">One of our challenges is to provide our clients with a global view of their problems. Adopting an <strong>agile approach requires a change in all levels</strong> of the business from security, to quality teams and as such the effect on all levels of the business must be considered.</p>
<p style="text-align: justify;"><strong>In terms of organisation</strong>, the ISS must reposition itself as <strong>a service to the business</strong> and thus shift its image from a ‘policeman’ to a support function. The role of <strong>Security Champion </strong>(a member of the feature team such as a developer) becomes the point of contact for the ISS teams. In doing this a connection can be created with each feature team, thus increasing autonomy over security integration. This is not something that can be achieved overnight, it requires training to highlight cybersecurity issues and share knowledge (particularly the basics of ISS and secure development). In addition to this, a security Guild should be created, bringing together ISS experts, security champions as well as security enthusiasts. This allows members to exchange information on the latest security news, good practices as feedback and lessons learned from the field. This Guild must be set-up in such a way to allow easy communication between members (such as on an internal wiki).</p>
<p style="text-align: justify;">After the security champion receives training from the ISS team, they become the security referent and thus developers can turn to them for questions and advice. Therefore, the role in itself is fairly technical. In adopting an agile approach, the ISS experts will keep their role, but the relationship will change from that of control and audit to support and facilitative. Audits can still be carried out (such as penetration tests) at the request of the feature team or on the initiative of the security experts. Methodological tools must also be available to help the Champions in their tasks and this includes rewriting risks in conversational format. To adapt to the use of User Stories by feature teams, the ISS team could try writing Evil User Stories, which correspond to an action carried out from the point of view of an attacker. For example:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17029 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN.png" alt="" width="1793" height="264" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN.png 1793w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-437x64.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-768x113.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/10/Image-2-EN-1536x226.png 1536w" sizes="auto, (max-width: 1793px) 100vw, 1793px" /></p>
<p style="text-align: justify;">Faced with these risks, there are Security User Stories, proposing remediation solutions for EUS, with ready-to-use acceptance criteria. All this can be integrated into a security baseline (also in backlog format, in a product management tool, such as JIRA for example), proposing a <strong>minimum-security base</strong> to be integrated into the products.</p>
<p style="text-align: justify;">In addition to organisational support for the teams, technical support must be provided by optimising the continuous integration and deployment chain (CI/CD) with tools aimed at <strong>automating security as much as possible</strong>, which can be called the <strong>Security Stack</strong> or <strong>Security Pipeline</strong>: code review, vulnerability scans, detection of secrets, security of the Infrastructure as Code, etc.).  Particular attention must be paid to its own security, so as not to produce the opposite effect&#8230; From a shift-left security perspective, security is integrated into the product by default, right from the start. It therefore adapts its velocity to that of an agile approach and enables a shift from a DevOps logic to that of DevSecOps. </p>
<p style="text-align: justify;">Another role can be created, that of <strong>AppSec Manager</strong>. This is part of the ISS team and is an expert in software security as well as an expert in the security stack. Their role is to help the developers to prioritise and remedy the vulnerabilities reported by the Stack. They work in tandem with the <strong>Risk Manager</strong>/IS expert, who provides them with knowledge of the risks associated with the product, which enables a more detailed analysis of the vulnerabilities to be dealt with as a priority. All this helps to create a culture of security by design.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>What do customer expect? </strong></h1>
<p style="text-align: justify;">CISO customers expect to be reassured that security in agile mode will not cause them to &#8220;lose control&#8221; over the proper implementation of security. The model we propose empowers the feature teams, gives them tools, but security retains control by centralising the performance indicators, by having the capacity to carry out random checks/according to predefined criteria, via bug bounty for example or an envelope of pentester days, to be distributed over the various products.</p>
<p style="text-align: justify;">Secondly, as a consultant, I think that clients expect us to share our <strong>convictions and very concrete examples</strong> of what we have been able to achieve for other clients. To meet this demand, Wavestone&#8217;s Cybersecurity and Digital Trust (CDT) practice has created several methodological accelerators based on feedback from the field, ready to be shared and adapted. Being able to carry out the mission in Agile mode was also part of the expectations, favouring <strong>co-construction</strong> rather than providing fixed and almost finalised deliverables from the first draft. In this gamification perspective, which is very important from an agile approach, we offer original co-construction workshops based on collective intelligence, thanks to our <strong>Creadesk</strong> asset, which trains consultants and provides them with tools for remote collective work.</p>
<p> </p>
<h1 style="text-align: justify;"><strong>Any final advice for our readers? </strong></h1>
<p style="text-align: justify;">Implementing a true <strong>test &amp; lean </strong>approach is crucial. In order to extract the most benefit from using co-constructing tools, we must regularly test and verify them in the field. While anticipating problems is crucial, significant value can be achieved when one we confront the problems as they arise. It allows us to be in direct contact with the business and feature teams, to show them that concrete actions are being implemented. The approach is agile, flexible, and scalable. The accelerators, methodologies and tools proposed evolve during the pilots and become even more relevant for the second wave of pilots, until all the feature teams are integrated.</p>
<p style="text-align: justify;">At the same time, it is important to remember that change management is essential. A real communication plan is needed &#8211; building communities of practice/guilds from the beginning of the pilots and identifying early adopters who will be valuable drivers of change within the teams. Agile has a real and rapid impact in everyday life and at all team levels: implementing this change is essential.  </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/10/agile-security/">Agile Security, Emma Barféty interview</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/10/agile-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How can we structure cybersecurity teams to better integrate security in Agile at scale?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/</link>
		
		<dc:creator><![CDATA[Vincent Nguyen]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 07:00:01 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[agile project]]></category>
		<category><![CDATA[enabler squad]]></category>
		<category><![CDATA[ISP agile]]></category>
		<category><![CDATA[security baseline]]></category>
		<category><![CDATA[security champion]]></category>
		<category><![CDATA[security guild]]></category>
		<category><![CDATA[x-team]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14961</guid>

					<description><![CDATA[<p>As discussed in the previous article (in French), ISS teams must adapt their organisation, processes and tools to ensure that security issues are considered on an ongoing basis. Agile methodologies are becoming more common within organisations and security teams must...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">How can we structure cybersecurity teams to better integrate security in Agile at scale?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As discussed in the <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/">previous article</a> (in French), ISS teams must adapt their organisation, processes and tools to ensure that security issues are considered on an ongoing basis.</p>
<p>Agile methodologies are becoming more common within organisations and security teams must <strong>adapt</strong> <strong>to be part of the new operational model</strong>.</p>
<p>However, when security is scaled up from a few Agile projects supported to hundreds, the scarcity of security expertise becomes a major obstacle. The consequence? Security teams become overloaded and unable to support all the <em>feature teams. </em>Therefore, feature teams are required to resolve issues with new functionalities and release without a security review.</p>
<p>In order to to support this transformation, CISO teams must thoroughly review their operating model to be relevant and enable and effective security environment. What does this mean? They must review their <strong>organisation</strong>, <strong>processes</strong> and <strong>tools</strong>.</p>
<p><strong> </strong></p>
<h2>How can we enable this transition?</h2>
<h3> Define new ISS roles for a transition to a new operating model</h3>
<p>&nbsp;</p>
<figure id="post-14962 media-14962" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-14962" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2.png" alt="" width="1625" height="928" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2.png 1625w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2-768x439.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-2-1536x877.png 1536w" sizes="auto, (max-width: 1625px) 100vw, 1625px" /></figure>
<p>&nbsp;</p>
<p>The first step is to understand the different roles that security must play in the new operating model to support this move to scale:</p>
<ul>
<li><strong>The <em>Security Guild</em></strong>: in order to share knowledge between teams, it is important to build a <strong>community of people</strong>, who have an interest for security and help them build the best practices. This community of <em>Security Champions</em>, which is described in the following paragraph (and anyone who is interested in security subjects), also has to implement a common framework of references on the methodologies (Security KM, Evil User Stories, Security Baseline, Level 1 control, <a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/">described in our previous article &#8211; in French &#8211;</a>).</li>
</ul>
<p><strong> </strong></p>
<ul>
<li><strong>The<em> Security Champion</em></strong>: this is the security ambassador within the <em>Feature</em> <em>Teams</em>. He/she is fully part of the team and present in every <em>sprint planning </em> His/her role is to ensure that security is considered at every sprint during the development of <em>User Stories</em>. The <em>Security Champion </em>may be from the developing world and develop skills on security subjects, with help from the Security <em>Guild</em> and the <em>Enabler Squad.</em></li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>The<em> Enabler Squad</em></strong>: if we look into Spotify’s model, it is the engine of all Guilds. A group of people from the CISO team who will steer the <em>Security Guild </em>while building methods, processes, products, services and standards for development, which will help <em>Security Champions </em>gain autonomy. When starting the industrialization of the model, they can play the role of a <em>Security Champion</em>, before training them. They also provide security expertise on the most critical perimeters and support the less mature teams.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>The<em> X-Team</em></strong><em>(“cross team”)</em>: If the Enabler Squad’s role is to assist the <em>Feature Teams</em> in the security integration, the X-Team’s is to control the security level and guarantee risk coverage. This team performs targeted technical tests (penetration tests, code review, etc). Obviously, performing a penetration test in every <em>Feature Team </em>and for every sprint is not possible as it is really time consuming. Therefore, tests could be done through sampling and/or randomly (thereby playing the “Chaos Monkey’s” role in the organisation<a href="#_ftn1" name="_ftnref1">[1]</a>), by focussing on the most sensitive and less mature perimeters. As long as enough security KPIs are received from the <em>Feature Teams</em>, the <em>X-Team</em> can perform controls on all teams, especially those where the security maturity is drifting from the targeted level.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>CISO</strong>: his/her role evolves and is now a checkpoint and provides them with the ability to reject a particular change if the appropriate security controls are not in place (E.g. based on the <em>X-Team </em>findings or according to a “security score” at application or infrastructure level, scored by the ISS team). Given that they cannot be present during all Agile discussions, they must rely on the <em>Security</em> <em>Guild </em>to point out where a strategic decision must be taken. However, they could participate in PI planning and other infrequent discussions, to have an overview on all the ongoing projects and decide which one should be supported more closely. Dedicated committees can also be set up, allowing projects to sign up and have subjects arbitrated, with a call to the CISO if final arbitration is required.</li>
</ul>
<p>&nbsp;</p>
<p>As in every change project, the effectiveness of acculturation lies more in practice than in theory. It’s better to start small and initiate a <strong>progressive handling of the new operating model by the ISS team. </strong>It will then be easier to expand the perimeter to the whole company.</p>
<p>&nbsp;</p>
<h3>Mobilising security experts to start the transition in 2 or 3 <em>Feature Teams</em></h3>
<p>Integration of security must be carried out continuously. The goal of <em>Feature Teams </em>is to be mature and competent in cybersecurity and to have autonomy regarding risk management. But <strong>in the interim period</strong>, the presence of security experts in a position support support is crucial in order to ease the integration of security into projects, while <em>Security Champions </em>are embedded in every <em>Feature Team. </em>These security experts must prioritise projects (e.g. critical projects, <em>Feature Teams </em>facing difficulties…) as they will not have the capacity to support every project.</p>
<p>The objective is to start the transition, using security experts from the ISS team to “do” with the teams, <strong>learn by doing </strong>and use this knowledge to build the first bricks of the security methods required by the Agile team.</p>
<p>It is at that point that the first <strong>useful tools and methodologies </strong>must be built, used and upgraded:</p>
<ul>
<li><strong>The Security Passport: </strong>it must be completed at every step of a project’s life (and beyond). It’s completed at the beginning of the project (at the same time as the PI Planning) to identify the project sensitivity, then set up and monitor the appropriate security measures.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>The Security Baseline:</strong> this is a set of basic security rules and standards, translated into “Agile language” (e.g. “as a developer I want to implement security measures to prevent attacks”) for easy integration into the backlogs of the <em>Feature Teams</em> and subsequently implementation during sprints. They are represented as <em>Security Stories</em>:</li>
</ul>
<figure id="post-14964 media-14964" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-14964 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-2.png" alt="" width="1469" height="196" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-2.png 1469w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-2-437x58.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-2-71x9.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-2-2-768x102.png 768w" sizes="auto, (max-width: 1469px) 100vw, 1469px" /></figure>
<p>&nbsp;</p>
<p>To reach a minimum level of security, projects (critical or not) must at the very least comply with this Security Baseline.</p>
<ul>
<li><strong>Training for the <em>Security Champion-to-be</em></strong></li>
<li style="list-style-type: none;">
<ul>
<li>Presentation of the job description, roles and responsibilities.</li>
<li>Training on evil user stories (EUS), security stories due to the gamification often used in Agile. <em>Security Champions </em>can get familiar with the Agile Card Game built by Wavestone (<a href="https://www.riskinsight-wavestone.com/en/2019/12/cybersecurity-transformation-agile/"><em>to learn more, </em>have a look <em>at that article &#8211; in French &#8211;</em></a>).</li>
<li>Learning how to use the knowledge management (KM) to share information, keep the community alive and know the key personnel.</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Securing team production</strong></li>
<li style="list-style-type: none;">
<ul>
<li>Controlling development: training about secure development, securing the CI/CD pipeline, setting up control over the code, etc.</li>
<li>Defining rules for separation of roles and responsibilities in DevOps: start of production, tests edition, production changeover, etc.</li>
</ul>
</li>
</ul>
<p>A more complete article will be dedicated to this last part.</p>
<p>&nbsp;</p>
<h2>What’s next? How do we transform to be able to scale?</h2>
<p>This interim period where ISS experts are working in <em>Feature Teams</em> is key <strong>for building the different roles, tools and processes. </strong></p>
<p>Once the model is well known by the ISS teams, it is time to <strong>deploy this methodology to the entire Agile perimeter.</strong></p>
<h3>Communicate</h3>
<p>Celebrating successes of the first set of <em>Feature Teams </em>involved in the pilots can trigger adoption by the rest of the teams.</p>
<p>Once the first projects have demonstrated the benefit of the approach and the tools and methods have been developed, it will just be a matter of spreading these best practices throughout the company.</p>
<h3>Train</h3>
<p>Security Experts could be used as coaches to spread good practices within <em>Feature Teams, </em>which will be trained progressively.</p>
<p>A good solution is to use half of the security experts to <strong>share tools </strong>and <strong>train the teams. That half is known as the <em>Security Enabler Squad</em>. </strong></p>
<p>The other half is then focused on <strong>risk mitigation </strong>for the critical or less mature areas, supporting them to achieve a good maturity level of the <em>Security Champions</em> of the other <em>Feature Teams</em>.</p>
<p>Communication and animation of the security community must go on around the transformation to support the change of scale.</p>
<h3>Control and steer the maturity of the <em>Security Champions</em></h3>
<p><strong> </strong>Finally, once <em>Feature Teams</em> are trained to use the security tools and methods, the ISS team, consisting of security experts can focus their efforts on <strong>controlling important releases</strong> and<strong> steering the Security Guild</strong>. As it is a space for information sharing, it has to be up to date, to pace up the maturity level of the entire Guild.</p>
<p><strong> </strong></p>
<h2>How long does it take to achieve full Agile Security?</h2>
<p>Initial feedback shows a 3-year transition from the beginning of the intermediate state, when the security team work closely with a few <em>Feature Teams</em>, to a completely autonomous team of <em>Security Champions. </em>It may seem long, but the transition to Agile is much more than a simple change of methodology. It is a real paradigm shift that requires significant change in ways of working and methods to ensure that change can be sustained in the future</p>
<p>In the next article, we will answer the following questions:</p>
<ul>
<li>How to ensure security controls in Agile?</li>
<li>Beyond projects support, how should the organisation and major ISS processes evolve to operate in the new Agile operating model of the company?</li>
</ul>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://netflix.github.io/chaosmonkey/">https://netflix.github.io/chaosmonkey/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale/">How can we structure cybersecurity teams to better integrate security in Agile at scale?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity in an agile world</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/</link>
		
		<dc:creator><![CDATA[Laura Gordon]]></dc:creator>
		<pubDate>Mon, 29 Jul 2019 20:17:15 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[agile]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infographic]]></category>
		<category><![CDATA[UK office]]></category>
		<category><![CDATA[world]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11933</guid>

					<description><![CDATA[<p>Organisations are deploying agile operating models and new ways of working in order to facilitate IS projects and build better products. Therefore, cybersecurity has to be taken into account into these new methods. What does cybersecurity mean in an agile...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/">Cybersecurity in an agile world</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Organisations are deploying agile operating models and new ways of working in order to facilitate IS projects and build better products. Therefore, cybersecurity has to be taken into account into these new methods. What does cybersecurity mean in an agile world ? This infographic brings an anwser to that.<br />
</em></p>
<figure></figure>
<figure id="post-11972 media-11972" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11972" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/Agile-cyber-infographic-vs-4_01.png" alt="" width="797" height="2476" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/Agile-cyber-infographic-vs-4_01.png 797w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/Agile-cyber-infographic-vs-4_01-61x191.png 61w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/Agile-cyber-infographic-vs-4_01-768x2386.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/06/Agile-cyber-infographic-vs-4_01-13x39.png 13w" sizes="auto, (max-width: 797px) 100vw, 797px" /></figure>
<p>&nbsp;</p>
<figure id="post-11934 media-11934" class="align-center"></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/">Cybersecurity in an agile world</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
