{"id":15390,"date":"2021-03-22T10:00:42","date_gmt":"2021-03-22T09:00:42","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=15390"},"modified":"2021-09-14T11:53:59","modified_gmt":"2021-09-14T10:53:59","slug":"security-accreditation-for-agile-projects-how-to-successfully-do-it","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/","title":{"rendered":"Security accreditation for Agile projects: how to successfully do it !"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>[<strong>nota bene<\/strong>: this article has been translated to English for accessibility reasons. It does not address UK or US regulations, but only French ones regarding Security Accreditation (\u201chomologation\u201d in French). It is nonetheless useful for any organization wanting to implement security accreditation in Agile projects.]<\/em><\/p>\n<p style=\"text-align: justify;\">\u201cSecurity accreditation is a formal act by which the authority responsible for a system commits its responsibility to risk management.\u201d <a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>. It is of course mandatory in some cases<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>, but beyond that, it is also a way of sending a strong message to users and top management: <strong>security is indeed a major topic for the<\/strong> <strong>organization<\/strong>. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.<\/p>\n<p style=\"text-align: justify;\">This method disrupted working habits of product teams and ISS teams (Information System Security). The latter have to find a way to go beyond adapting old accreditation method and propose a new relevant solution to still comply with the original goal of the accreditation: \u201cFind a balance between acceptable risk and security costs, then have it formally accepted by a manager\/an authority who has the power to do so<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a>\u201d.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\">One solution: provisional accreditation and long-term accreditation<\/h2>\n<p style=\"text-align: justify;\">As a famous Agile Security expert from Wavestone once said: \u201cAgile and accreditation, it\u2019s not rocket science\u201d. Without denying the difficulties, explaining it is quite simple. Faced with teams that must deliver faster and provide continuous releases, the risk levels and therefore the security accreditation must be dealt with at the same pace.<\/p>\n<h3>What should the accreditation consider?<\/h3>\n<p style=\"text-align: justify;\">As always, security accreditation is all about giving thorough information on a project\u2019s security risk level to the Accreditation Authority, for them to decide if it\u2019s acceptable with regard to the organization ISS criteria (e.g. number of EUS still on the backlog, percentage of security baseline rules implemented on a given scope, etc.). Then, they take responsibility for the possible residual risks.<\/p>\n<p style=\"text-align: justify;\">For example, only a few features are available to a few users at the beginning of a project. This small scope will display a lower level of risk (because of a low level of exposure) despite not being fully secured yet. Provisional accreditation (for a few months for example) may be issued to allow experimentation. It will have to be renewed when renewal criteria (defined in advance) are met.<\/p>\n<figure id=\"post-15391 media-15391\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15391 size-full aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/03\/Schema-agilite-EN.png\" alt=\"\" width=\"1652\" height=\"930\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/03\/Schema-agilite-EN.png 1652w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/03\/Schema-agilite-EN-339x191.png 339w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/03\/Schema-agilite-EN-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/03\/Schema-agilite-EN-768x432.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/03\/Schema-agilite-EN-1536x865.png 1536w\" sizes=\"auto, (max-width: 1652px) 100vw, 1652px\" \/><\/figure>\n<p style=\"text-align: center;\"><strong><em>Figure 1 <\/em><\/strong><em>\u2013 Product exposure to residual risk<br \/>\nFrom the ANSSI&nbsp;guide (in French): Digital Agility and Security, October 2018 (<\/em><a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2018\/11\/guide-securite-numerique-agile-anssi-pa-v1.pdf\"><em>link to the guide<\/em><\/a><em>)<\/em><\/p>\n<p style=\"text-align: justify;\">For a project at cruising speed, accessible to its target audience with all the expected features, a firm accreditation (3 years for example) is pronounced. The criteria for renewal, leading to the issuance of a new accreditation, are also defined in advance.<\/p>\n<h3>When to renew the accreditation?<\/h3>\n<p style=\"text-align: justify;\">The criteria used to know when to renew the accreditation are closely linked to the project, the context, or the scope, but here are <strong>some examples<\/strong> to build these criteria. The provisional accreditation is valid until:<\/p>\n<ul style=\"text-align: justify;\">\n<li>New critical features are added (\u201ccritical\u201d depending on the project),<\/li>\n<li>A new threshold for the number of users has been reached (defined in advance, depending on the associated risks),<\/li>\n<li>New personal data must be integrated and processed by the project,<\/li>\n<li>New features related to payments must be implemented,<\/li>\n<li>A new level of transaction volume is reached,<\/li>\n<li>And of course when the accreditation deadline is reached.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Long-term accreditation is valid for a longer time because less changes are expected at this stage of the project. That being said, the accreditation will have to be renewed regularly (at least every 3 years) to check on security levels and in a will of <strong>continuous improvement<\/strong>.<\/p>\n<h3>What evidence should squads bring?<\/h3>\n<p style=\"text-align: justify;\">Squads\/feature teams should be able to bring different types of evidence\/proofs (of the security level) to the Accreditation authority\/responsible for the accreditation. The Evil User Stories (EUS) serve as what we used to call risks, where prioritization gives information about their criticality (see our <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/how-to-conduct-an-agile-cyber-security-workshop\/\">article on how to lead a workshop on risk analysis in Agile<\/a>). An extract from the backlog can be used as proof that the main EUS have been processed and that <strong>residual EUS<\/strong> are known (and accepted by the Accreditation Authority).<\/p>\n<p style=\"text-align: justify;\">The <strong>Security Form<\/strong> (or Passport, detailed in <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/12\/cybersecurity-transformation-agile\/\">this article on Agile transformation<\/a> &#8211; <em>in French<\/em> -) is also a relevant way to follow-up on security levels of projects.<\/p>\n<p style=\"text-align: justify;\"><strong>Code review<\/strong> and <strong>vulnerability scan reports<\/strong> can also be used (for squads that have integrated DevSecOps and have the appropriate tools).<\/p>\n<p style=\"text-align: justify;\">If the X-team exists (see <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/01\/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale\/\">our article on the new ISS roles in Agile and the corresponding organization<\/a>) or if an external audit team was able to perform them, the penetration test reports are also presented.<\/p>\n<p style=\"text-align: justify;\">Any other existing documents can be used to give all necessary information (architecture documents, applicable regulations, etc.).<\/p>\n<p style=\"text-align: justify;\">For provisional accreditation, these documents don\u2019t have to be gathered in a proper \u201caccreditation folder\u201d, which would imply losing time for squads. What is necessary is to ensure they exist and are available to anyone involved in the accreditation process (accreditation authority or their delegate, ISS team, etc.).<\/p>\n<h3>Who are the actors in this process?<\/h3>\n<p style=\"text-align: justify;\">During product development, the <strong>Security Champion<\/strong> (<a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/01\/how-to-structure-cybersecurity-teams-to-integrate-security-in-agile-at-scale\/\">see this article for definition<\/a>) is in charge of organizing the risk analysis workshops (identification of EUS and associated Security Stories). The ISS team is of course involved in the process, bringing their knowledge to the squads during workshops.<\/p>\n<p style=\"text-align: justify;\">The <strong>Product Owner<\/strong> is responsible for the creation and updates of the necessary documentation. They also make sure the ISS team is informed and asked for help when needed.<\/p>\n<p style=\"text-align: justify;\"><strong>The accreditation Authority<\/strong> should be a business manager (e.g. the Business Owner) as usual. They must have the capacity to accept <strong>residual risks<\/strong> and validate the product security levels. As security should not slow down any Agile processes, the signing of a provisional accreditation may be delegated to the Product Owner, <strong>as they are representative of the Business Owner in the squad<\/strong>. The temporary accreditation can thus be signed faster if criteria for validity are met. In some cases, where projects would pose a risk to other businesses or systems, a transversal officer\/business owner must be found, to sign for both businesses or systems. If no one is found, or no compromise is achieved, the Chief Information Officer (CIO) will assume responsibility, as it is their role to ensure the operational conditions of the Information System.<\/p>\n<p style=\"text-align: justify;\">As a conclusion, security accreditation remains key when speaking about integration of security into projects, in particular within the Agile framework which changes the product teams\u2019 way of working. The ISS teams must take advantage and (re)join these product teams (through the Security Champion and the security training of the product teams) and thus work together towards the incremental reduction of risk.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">More articles to come on Agile Security, stay tuned!<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> ANSSI guide (in French): <em>Digital<\/em> <em>Agility and Security<\/em>, October 2018 (<a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2018\/11\/guide-securite-numerique-agile-anssi-pa-v1.pdf\">link to the guide<\/a>)<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> (<strong>French regulations only<\/strong>) For administrations: decree n \u00b0 2010-112 of February 2, 2010, terms of the General Safety Reference System (RGS). For any product dealing with information coming under National Defense secrecy: Interministerial General Instruction 1300. For operators of vital importance: cyber section of the LPM (law n \u00b0 2013-1168 of 18 December 2013 &#8211; article 22), to strengthen the security of the critical information systems they operate, carried out as part of an accreditation process.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> ANSSI&nbsp;guide (in French): <em>The nine steps of the security accreditation<\/em>, August 2014 (<a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2014\/06\/guide_homologation_de_securite_en_9_etapes.pdf\">link to the guide<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[nota bene: this article has been translated to English for accessibility reasons. It does not address UK or US regulations, but only French ones regarding Security Accreditation (\u201chomologation\u201d in French). It is nonetheless useful for any organization wanting to implement&#8230;<\/p>\n","protected":false},"author":1357,"featured_media":14669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,3977,3974],"tags":[3841,3413],"coauthors":[3212,3524],"class_list":["post-15390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-focus","category-how-to-en","tag-accreditation","tag-agility"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security accreditation for Agile projects: how to successfully do it ! - RiskInsight<\/title>\n<meta name=\"description\" content=\"Security accreditation is of course mandatory in some cases, but beyond that, it is also a way of sending a strong message to users and top management: security is indeed a major topic for the organization. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security accreditation for Agile projects: how to successfully do it ! - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Security accreditation is of course mandatory in some cases, but beyond that, it is also a way of sending a strong message to users and top management: security is indeed a major topic for the organization. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T09:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T10:53:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vincent Nguyen, Emma Barfety\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vincent Nguyen, Emma Barfety\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\"},\"author\":{\"name\":\"Vincent Nguyen\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/836af2ef2be74699a7090c74f4465aa7\"},\"headline\":\"Security accreditation for Agile projects: how to successfully do it !\",\"datePublished\":\"2021-03-22T09:00:42+00:00\",\"dateModified\":\"2021-09-14T10:53:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\"},\"wordCount\":1253,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg\",\"keywords\":[\"accreditation\",\"agility\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Focus\",\"How to\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\",\"name\":\"Security accreditation for Agile projects: how to successfully do it ! - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg\",\"datePublished\":\"2021-03-22T09:00:42+00:00\",\"dateModified\":\"2021-09-14T10:53:59+00:00\",\"description\":\"Security accreditation is of course mandatory in some cases, but beyond that, it is also a way of sending a strong message to users and top management: security is indeed a major topic for the organization. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security accreditation for Agile projects: how to successfully do it !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/836af2ef2be74699a7090c74f4465aa7\",\"name\":\"Vincent Nguyen\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/vincent-nguyen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security accreditation for Agile projects: how to successfully do it ! - RiskInsight","description":"Security accreditation is of course mandatory in some cases, but beyond that, it is also a way of sending a strong message to users and top management: security is indeed a major topic for the organization. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/","og_locale":"en_US","og_type":"article","og_title":"Security accreditation for Agile projects: how to successfully do it ! - RiskInsight","og_description":"Security accreditation is of course mandatory in some cases, but beyond that, it is also a way of sending a strong message to users and top management: security is indeed a major topic for the organization. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/","og_site_name":"RiskInsight","article_published_time":"2021-03-22T09:00:42+00:00","article_modified_time":"2021-09-14T10:53:59+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg","type":"image\/jpeg"}],"author":"Vincent Nguyen, Emma Barfety","twitter_misc":{"Written by":"Vincent Nguyen, Emma Barfety","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/"},"author":{"name":"Vincent Nguyen","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/836af2ef2be74699a7090c74f4465aa7"},"headline":"Security accreditation for Agile projects: how to successfully do it !","datePublished":"2021-03-22T09:00:42+00:00","dateModified":"2021-09-14T10:53:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/"},"wordCount":1253,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg","keywords":["accreditation","agility"],"articleSection":["Cyberrisk Management &amp; Strategy","Focus","How to"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/","name":"Security accreditation for Agile projects: how to successfully do it ! - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg","datePublished":"2021-03-22T09:00:42+00:00","dateModified":"2021-09-14T10:53:59+00:00","description":"Security accreditation is of course mandatory in some cases, but beyond that, it is also a way of sending a strong message to users and top management: security is indeed a major topic for the organization. Agile methodology was at first designed for projects, but it can be a real opportunity for security teams to reduce security risks.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk-scaled.jpg","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/03\/security-accreditation-for-agile-projects-how-to-successfully-do-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security accreditation for Agile projects: how to successfully do it !"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/836af2ef2be74699a7090c74f4465aa7","name":"Vincent Nguyen","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/vincent-nguyen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/15390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1357"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=15390"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/15390\/revisions"}],"predecessor-version":[{"id":16794,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/15390\/revisions\/16794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/14669"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=15390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=15390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=15390"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=15390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}