Pervasive security

DORA Shift left on security

Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
Pervasive security создатель Mind Map: Pervasive security

1. Improve

1.1. Invite InfoSec to demos

1.2. Build pre-approved code

1.3. Security review at each phases,

1.3.1. Including design

1.4. Involve Infosec in CICD / testing automation

2. Understand

2.1. Usual cycle

2.1.1. design -> code -> build - test -> release-deploy

2.2. It is too late !!

2.2.1. to care about security when

2.2.1.1. testing

2.2.1.2. Scanning containers

2.3. Shift left

2.3.1. Care about security in design phase

2.3.2. As security design flaw are too expensive to fix

3. Pitfalls

3.1. Low Dev <-> infoSec collaboration

3.2. Understaffed InfoSec teams

3.2.1. e.g. ratio

3.2.1.1. 1 InfoSec

3.2.1.2. 10 Infra

3.2.1.3. 100 Dev

3.3. Engaging InfoSec tool ate

3.4. Dev unfamiliar with common security risk

3.4.1. OWASP Top 10

3.4.1.1. Broken Access control

3.4.1.2. Cryptographic failures

3.4.1.3. Injection

3.4.1.4. Insecure design

3.4.1.5. Security misconfigurations

3.4.1.6. Vulnerable and outdated components

3.4.1.7. Identification and authentification failures

3.4.1.8. Software and data integrity failures

3.4.1.9. Security logging and monitoring failures

3.4.1.10. Server side request forgery

4. Implement

4.1. Involve InfoSec in Software design

4.1.1. Setup

4.1.1.1. Process to request

4.1.1.2. Security trained Developers

4.1.1.3. InfoSec resources to deliver

4.1.2. Run

4.1.2.1. Design Level advice review

4.1.2.1.1. aka before dev

4.2. Develop security approved tools

4.2.1. Approved

4.2.1.1. libraries

4.2.1.2. utilities

4.2.2. leads to standardize code

4.2.3. leads to

4.2.3.1. speed up code review

4.2.3.2. Automate use of approved tool check

5. Measure

5.1. % features with security design review

5.2. Mean time for a security review